Skip to content

Agent Tools

The @agnt-rcpt/openclaw plugin registers two tools that the OpenClaw agent can call directly during a session:

ToolPurpose
ar_query_receiptsQuery and summarise receipts from the current or past sessions
ar_verify_chainVerify the cryptographic integrity of a receipt chain

These tools are not visible by default. See Installation: Tool visibility for the alsoAllow config required to expose them to the agent.


Returns a summary of receipts matching the given filters, including breakdowns by risk level, outcome status, and action type.

ParameterTypeDescription
action_typestring (optional)Filter by action type, e.g. filesystem.file.read
risk_levelstring (optional)Filter by risk level: low, medium, high, critical
statusstring (optional)Filter by outcome: success or failure
limitnumber (optional)Maximum number of results to include
session_idstring (optional)Restrict to a specific session; defaults to the current session

All parameters are optional. Called with no arguments the tool returns a summary of all receipts in the current session.

Agent prompt:

Query all high-risk actions from this session

Tool response:

{
"total_receipts": 12,
"results": [
{ "action": "filesystem.file.delete", "risk": "high", "target": "delete_file", "status": "success", "sequence": 7 },
{ "action": "system.command.execute", "risk": "high", "target": "run_command", "status": "success", "sequence": 3 }
]
}

Verifies the cryptographic integrity of a receipt chain: checks every Ed25519 signature and every SHA-256 hash link between receipts.

ParameterTypeDescription
chain_idstringThe chain to verify. Defaults to the current session’s chain if omitted.

Agent prompt:

Verify the audit trail for this session

Tool response:

Chain "chain_openclaw_main_sid-42" is valid: 12 receipts, all signatures and hash links verified.

If a receipt has been modified or removed after it was signed, the tool reports the first position where verification fails:

Chain "chain_openclaw_main_sid-42": BROKEN at position 7
Tamper detected! The following receipts have issues:
[7] urn:receipt:...: invalid signature, hash link

Both tools require explicit opt-in. The default "coding" profile in OpenClaw does not expose plugin-registered tools. Add them to alsoAllow in your openclaw.json:

{
"tools": {
"profile": "coding",
"alsoAllow": ["ar_query_receipts", "ar_verify_chain"]
}
}

See Installation: Tool visibility for alternative configurations, including profile-level and plugin-level allowlisting.