Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Automated Linux server patching and Docker container updates. Use when the user asks to update, patch, or upgrade Linux servers, apply security updates, update Docker containers, check for system updates, or manage server maintenance across multiple hosts. Supports Ubuntu, Debian, RHEL, AlmaLinux, Rocky Linux, CentOS, Amazon Linux, and SUSE. Includes PatchMon integration for automatic host detection and intelligent Docker handling. --- name: linux-patcher description: Automated Linux server patching and Docker container updates. Use when the user asks to update, patch, or upgrade Linux servers, apply security updates, update Docker containers, check for system updates, or manage server maintenance across multiple hosts. Supports Ubuntu, Debian, RHEL, AlmaLinux, Rocky Linux, CentOS, Amazon Linux, and SUSE. Includes PatchMon integration for autom Published capability contract available. No trust telemetry is available yet. 3 GitHub stars reported by the source. Last updated 3/1/2026.
Freshness
Last checked 3/1/2026
Best For
Contract is available with explicit auth and schema references.
Not Ideal For
linux-patcher is not ideal for teams that need stronger public trust telemetry, lower setup complexity, or more explicit contract coverage before production rollout.
Evidence Sources Checked
editorial-content, capability-contract, runtime-metrics, public facts pack
Automated Linux server patching and Docker container updates. Use when the user asks to update, patch, or upgrade Linux servers, apply security updates, update Docker containers, check for system updates, or manage server maintenance across multiple hosts. Supports Ubuntu, Debian, RHEL, AlmaLinux, Rocky Linux, CentOS, Amazon Linux, and SUSE. Includes PatchMon integration for automatic host detection and intelligent Docker handling. --- name: linux-patcher description: Automated Linux server patching and Docker container updates. Use when the user asks to update, patch, or upgrade Linux servers, apply security updates, update Docker containers, check for system updates, or manage server maintenance across multiple hosts. Supports Ubuntu, Debian, RHEL, AlmaLinux, Rocky Linux, CentOS, Amazon Linux, and SUSE. Includes PatchMon integration for autom
Public facts
7
Change events
1
Artifacts
0
Freshness
Mar 1, 2026
Published capability contract available. No trust telemetry is available yet. 3 GitHub stars reported by the source. Last updated 3/1/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Mar 1, 2026
Vendor
Jgm2025
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Published capability contract available. No trust telemetry is available yet. 3 GitHub stars reported by the source. Last updated 3/1/2026.
Setup snapshot
git clone https://github.com/JGM2025/linux-patcher-skill.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Jgm2025
Protocol compatibility
OpenClaw
Auth modes
api_key
Machine-readable schemas
OpenAPI or schema references published
Adoption signal
3 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
bash
scripts/patch-auto.sh
bash
scripts/patch-auto.sh --skip-docker
bash
scripts/patch-auto.sh --dry-run
bash
scripts/patch-host-only.sh user@hostname
bash
scripts/patch-host-full.sh user@hostname /path/to/docker/compose
bash
scripts/patch-multiple.sh config-file.conf
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Automated Linux server patching and Docker container updates. Use when the user asks to update, patch, or upgrade Linux servers, apply security updates, update Docker containers, check for system updates, or manage server maintenance across multiple hosts. Supports Ubuntu, Debian, RHEL, AlmaLinux, Rocky Linux, CentOS, Amazon Linux, and SUSE. Includes PatchMon integration for automatic host detection and intelligent Docker handling. --- name: linux-patcher description: Automated Linux server patching and Docker container updates. Use when the user asks to update, patch, or upgrade Linux servers, apply security updates, update Docker containers, check for system updates, or manage server maintenance across multiple hosts. Supports Ubuntu, Debian, RHEL, AlmaLinux, Rocky Linux, CentOS, Amazon Linux, and SUSE. Includes PatchMon integration for autom
Automate Linux server patching and Docker container updates across multiple hosts via SSH.
Fully Tested:
Supported but Untested:
Testing Recommendation: Always test untested distributions in a non-production environment first. The script will warn you when running on untested distributions.
This skill requires:
Read SETUP.md for complete security configuration guide.
Patch all hosts from PatchMon (automatic detection):
scripts/patch-auto.sh
Skip Docker updates (packages only):
scripts/patch-auto.sh --skip-docker
Preview changes (dry-run):
scripts/patch-auto.sh --dry-run
Single host - packages only:
scripts/patch-host-only.sh user@hostname
Single host - full update:
scripts/patch-host-full.sh user@hostname /path/to/docker/compose
Multiple hosts from config:
scripts/patch-multiple.sh config-file.conf
--skip-docker flagvisudo or /etc/sudoers.d/ filesConfigure PatchMon credentials for automatic host detection:
cp scripts/patchmon-credentials.example.conf ~/.patchmon-credentials.conf
nano ~/.patchmon-credentials.conf
Set your credentials:
PATCHMON_URL=https://patchmon.example.com
PATCHMON_USERNAME=your-username
PATCHMON_PASSWORD=your-password
Then simply run:
scripts/patch-auto.sh
The script will:
Run scripts directly with command-line arguments (no config file needed).
Create a config file based on scripts/patch-hosts-config.example.sh:
cp scripts/patch-hosts-config.example.sh my-servers.conf
nano my-servers.conf
Example config:
# Host definitions: hostname,ssh_user,docker_path
HOSTS=(
"webserver.example.com,ubuntu,/opt/docker"
"database.example.com,root,/home/admin/compose"
"monitor.example.com,docker,/srv/monitoring"
)
# Update mode: "host-only" or "full"
UPDATE_MODE="full"
# Dry run mode (set to "false" to apply changes)
DRY_RUN="true"
Then run:
scripts/patch-multiple.sh my-servers.conf
ssh command available)Install missing tools:
# Ubuntu/Debian
sudo apt install curl jq
# RHEL/CentOS/Rocky/Alma
sudo dnf install curl jq
# macOS
brew install curl jq
PatchMon is required to automatically detect which hosts need patching.
Important: PatchMon does NOT need to be installed on the same server as OpenClaw. Install PatchMon on a separate server (can be any server on your network), and OpenClaw will query it via API.
Download PatchMon:
What you need:
Architecture:
┌─────────────────┐ HTTPS API ┌─────────────────┐
│ OpenClaw Host │ ──────────────────> │ PatchMon Server │
│ (this machine) │ Query updates │ (separate host) │
└─────────────────┘ └─────────────────┘
│
│ Reports
▼
┌─────────────────┐
│ Target Hosts │
│ (with agents) │
└─────────────────┘
Quick Start:
cp scripts/patchmon-credentials.example.conf ~/.patchmon-credentials.conf
nano ~/.patchmon-credentials.conf # Set PatchMon server URL
chmod 600 ~/.patchmon-credentials.conf
Detailed setup:
See references/patchmon-setup.md for complete installation guide.
Can I use this skill without PatchMon? Yes! You can use manual mode to target specific hosts without PatchMon. However, automatic detection of hosts needing updates requires PatchMon.
Required:
apt and docker commands)For full updates:
On each target host, create /etc/sudoers.d/patches:
# For Ubuntu/Debian systems
username ALL=(ALL) NOPASSWD: /usr/bin/apt, /usr/bin/docker
# For RHEL/CentOS systems
username ALL=(ALL) NOPASSWD: /usr/bin/yum, /usr/bin/docker, /usr/bin/dnf
Replace username with your SSH user. Test with sudo -l to verify.
Updates system packages only:
apt update && apt upgrade (or yum update on RHEL)apt autoremove)When to use:
Complete update cycle:
docker system prune)When to use:
sudo apt updatesudo apt -y upgradesudo apt -y autoremovesudo apt update && upgrade && autoremovesudo docker system prune -af (cleanup)sudo docker compose pullsudo docker compose up -d (recreate containers)When using automatic mode:
When Docker path is not specified, the script checks these locations:
/home/$USER/Docker/docker-compose.yml/opt/docker/docker-compose.yml/srv/docker/docker-compose.yml$HOME/Docker/docker-compose.ymlOverride auto-detection:
scripts/patch-host-full.sh user@host /custom/path
# First time: configure credentials
cp scripts/patchmon-credentials.example.conf ~/.patchmon-credentials.conf
nano ~/.patchmon-credentials.conf
# Run automatic updates
scripts/patch-auto.sh
# Preview what would be updated
scripts/patch-auto.sh --dry-run
# Review output, then apply
scripts/patch-auto.sh
# Update packages only, even if Docker is detected
scripts/patch-auto.sh --skip-docker
scripts/patch-host-only.sh admin@webserver.example.com
scripts/patch-host-full.sh docker@app.example.com /home/docker/production
scripts/patch-multiple.sh production-servers.conf
Simply ask OpenClaw:
OpenClaw will use the automatic mode and report results.
cp scripts/patchmon-credentials.example.conf ~/.patchmon-credentials.confPATCHMON_CONFIG environment variable to custom locationcurl -k https://patchmon.example.com/api/healthsystemctl status patchmon-agent/etc/patchmon/config.ymlpatchmon-agent reportssh user@host sudo apt updatessh user@host echo OKscripts/patch-host-full.sh user@host /full/path/home/user/Docker, /opt/docker, /srv/dockerssh user@host "docker logs container-name"ssh user@host "cd /docker/path && docker compose logs"ssh user@host "cd /docker/path && docker compose down && docker compose up -d"For dashboard monitoring and scheduled patching, see references/patchmon-setup.md.
PatchMon provides:
apt, docker only)/etc/sudoers.d/ files (easier to manage)chmod 600 ~/.ssh/id_rsaThe scripts do NOT automatically reboot hosts. After updates:
ssh user@host "[ -f /var/run/reboot-required ] && echo YES || echo NO"Create a cron job for automatic nightly patching:
cron add --name "Nightly Server Patching" \
--schedule "0 2 * * *" \
--task "cd ~/.openclaw/workspace/skills/linux-patcher && scripts/patch-auto.sh"
Or packages-only mode:
cron add --name "Nightly Package Updates" \
--schedule "0 2 * * *" \
--task "cd ~/.openclaw/workspace/skills/linux-patcher && scripts/patch-auto.sh --skip-docker"
Simply ask OpenClaw natural language commands:
Full updates (packages + Docker containers):
Packages only (exclude Docker):
Query status:
What happens automatically:
When you say "Update my servers":
When you say "Update my servers, excluding docker":
Important: Docker updates are included by default for maximum automation. Use "excluding docker" to skip container updates.
Target individual hosts without querying PatchMon:
OpenClaw will use the manual scripts for targeted updates.
This skill includes comprehensive documentation:
First time setup? Read SETUP.md first - it provides step-by-step instructions for secure configuration.
Want to understand the flow? Check WORKFLOWS.md for visual diagrams of how the skill operates.
| Distribution | Package Manager | Tested | Status | |--------------|-----------------|--------|--------| | Ubuntu | apt | ✅ Yes | Fully supported | | Debian | apt | ⚠️ No | Supported (untested) | | Amazon Linux 2 | yum | ⚠️ No | Supported (untested) | | Amazon Linux 2023 | dnf | ⚠️ No | Supported (untested) | | RHEL 7 | yum | ⚠️ No | Supported (untested) | | RHEL 8+ | dnf | ⚠️ No | Supported (untested) | | AlmaLinux | dnf | ⚠️ No | Supported (untested) | | Rocky Linux | dnf | ⚠️ No | Supported (untested) | | CentOS 7 | yum | ⚠️ No | Supported (untested) | | CentOS 8+ | dnf | ⚠️ No | Supported (untested) | | SUSE/OpenSUSE | zypper | ⚠️ No | Supported (untested) |
The skill automatically detects the distribution and selects the appropriate package manager.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
ready
Auth
api_key
Streaming
No
Data region
global
Protocol support
Requires: openclew, lang:typescript
Forbidden: none
Guardrails
Operational confidence: medium
curl -s "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/snapshot"
curl -s "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/contract"
curl -s "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "ready",
"authModes": [
"api_key"
],
"requires": [
"openclew",
"lang:typescript"
],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": "https://github.com/JGM2025/linux-patcher-skill#input",
"outputSchemaRef": "https://github.com/JGM2025/linux-patcher-skill#output",
"dataRegion": "global",
"contractUpdatedAt": "2026-02-24T19:44:25.432Z",
"sourceUpdatedAt": "2026-02-24T19:44:25.432Z",
"freshnessSeconds": 4424999
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T00:54:24.704Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "be",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "i",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "use",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "status",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "both",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "rhel",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "centos",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:be|supported|profile capability:i|supported|profile capability:use|supported|profile capability:status|supported|profile capability:both|supported|profile capability:rhel|supported|profile capability:centos|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Jgm2025",
"href": "https://github.com/JGM2025/linux-patcher-skill",
"sourceUrl": "https://github.com/JGM2025/linux-patcher-skill",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-03-01T06:04:32.348Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "3 GitHub stars",
"href": "https://github.com/JGM2025/linux-patcher-skill",
"sourceUrl": "https://github.com/JGM2025/linux-patcher-skill",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-03-01T06:04:32.348Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-24T19:44:25.432Z",
"isPublic": true
},
{
"factKey": "auth_modes",
"category": "compatibility",
"label": "Auth modes",
"value": "api_key",
"href": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:44:25.432Z",
"isPublic": true
},
{
"factKey": "schema_refs",
"category": "artifact",
"label": "Machine-readable schemas",
"value": "OpenAPI or schema references published",
"href": "https://github.com/JGM2025/linux-patcher-skill#input",
"sourceUrl": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:44:25.432Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/jgm2025-linux-patcher-skill/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to linux-patcher and adjacent AI workflows.