← Back to Plugins
Tools

Log Analysis

StressTestor By StressTestor 👁 12 views ▲ 0 votes

openclaw plugin for log pattern detection and anomaly highlighting. day 13 of 20 days of claw.

GitHub

Install

openclaw plugins install -l

Configuration Example

{
  "plugins": {
    "log-analysis": {
      "scanExecOutput": true,
      "defaultSeverityThreshold": "warning",
      "maxLogLines": 10000
    }
  }
}

README

# log-analysis

openclaw plugin for pattern detection and anomaly highlighting. scans log files, exec output, and text blocks for errors, warnings, and critical issues.

regex-based. no ML, no cloud, no dependencies. ships with 15 built-in patterns covering stack traces, OOM, segfaults, permission errors, timeouts, and more.

## install

```bash
openclaw plugins install -l .
```

## config

```json
{
  "plugins": {
    "log-analysis": {
      "scanExecOutput": true,
      "defaultSeverityThreshold": "warning",
      "maxLogLines": 10000
    }
  }
}
```

### options

| option | default | what it does |
|--------|---------|-------------|
| `scanExecOutput` | `true` | auto-scan exec tool output for error patterns |
| `defaultSeverityThreshold` | `"warning"` | minimum severity to report |
| `maxLogLines` | `10000` | max lines to analyze per file |

## tools

- **analyze_log** - analyze a log file or text block for patterns
- **log_watch** - check last 100 lines of a file for issues
- **log_summary** - summarize error/warning frequency with pattern breakdown
- **log_patterns** - list/add/remove detection patterns

## hooks

- **after_tool_call** - auto-scans exec tool output for error patterns, surfaces warnings inline

## built-in patterns

stack traces (JS + Python), segfaults, OOM, permission denied, connection refused, timeouts, disk full, DNS failures, rust panics, non-zero exit codes, kill signals, deprecation notices, and generic ERROR/WARN/FATAL keywords.

add your own patterns at runtime with the `log_patterns` tool.

## day 13 of [20 days of claw](https://github.com/StressTestor)
tools

Comments

Sign in to leave a comment

Loading comments...