✓ Verified
💻 Development
✓ Enhanced Data
Hookaido
Operate Hookaido inbound/outbound webhook flows, queue triage, MCP workflows, and gRPC-pull workers.
- Rating
- 4.8 (435 reviews)
- Downloads
- 24,573 downloads
- Version
- 1.0.0
Overview
Operate Hookaido inbound/outbound webhook flows, queue triage, MCP workflows, and gRPC-pull workers.
Complete Documentation
View Source →name: claw-skill-hookaido description: Receive incoming webhooks from external services and trigger automations, integrations, and event-driven workflows. Operate Hookaido v2 inbound/outbound/internal webhook flows, queue triage, MCP workflows, release verification, and HTTP/gRPC pull workers. Use when tasks involve Hookaidofile authoring, queue backend selection (
sqlite, memory, postgres), hookaido CLI commands (run, config fmt, config validate, mcp serve), pull operations (dequeue/ack/nack/extend) over HTTP or gRPC, Admin API backlog/DLQ handling, or production hardening for ingress and delivery.
metadata: {"openclaw":{"homepage":"https://github.com/7schmiede/claw-skill-hookaido","requires":{"bins":["hookaido"]},"install":[{"id":"download-darwin-amd64","kind":"download","os":["darwin"],"url":"https://github.com/nuetzliches/hookaido/releases/download/v2.0.0/hookaido_v2.0.0_darwin_amd64.tar.gz","archive":"tar.gz","extract":true,"stripComponents":1,"targetDir":"~/.local/bin","bins":["hookaido"],"label":"Download hookaido v2.0.0 (macOS amd64)"},{"id":"download-darwin-arm64","kind":"download","os":["darwin"],"url":"https://github.com/nuetzliches/hookaido/releases/download/v2.0.0/hookaido_v2.0.0_darwin_arm64.tar.gz","archive":"tar.gz","extract":true,"stripComponents":1,"targetDir":"~/.local/bin","bins":["hookaido"],"label":"Download hookaido v2.0.0 (macOS arm64)"},{"id":"download-linux-amd64","kind":"download","os":["linux"],"url":"https://github.com/nuetzliches/hookaido/releases/download/v2.0.0/hookaido_v2.0.0_linux_amd64.tar.gz","archive":"tar.gz","extract":true,"stripComponents":1,"targetDir":"~/.local/bin","bins":["hookaido"],"label":"Download hookaido v2.0.0 (Linux amd64)"},{"id":"download-linux-arm64","kind":"download","os":["linux"],"url":"https://github.com/nuetzliches/hookaido/releases/download/v2.0.0/hookaido_v2.0.0_linux_arm64.tar.gz","archive":"tar.gz","extract":true,"stripComponents":1,"targetDir":"~/.local/bin","bins":["hookaido"],"label":"Download hookaido v2.0.0 (Linux arm64)"},{"id":"download-windows-amd64","kind":"download","os":["win32"],"url":"https://github.com/nuetzliches/hookaido/releases/download/v2.0.0/hookaido_v2.0.0_windows_amd64.zip","archive":"zip","extract":true,"targetDir":"~/.openclaw/tools/hookaido","bins":["hookaido"],"label":"Download hookaido v2.0.0 (Windows amd64)"},{"id":"download-windows-arm64","kind":"download","os":["win32"],"url":"https://github.com/nuetzliches/hookaido/releases/download/v2.0.0/hookaido_v2.0.0_windows_arm64.zip","archive":"zip","extract":true,"targetDir":"~/.openclaw/tools/hookaido","bins":["hookaido"],"label":"Download hookaido v2.0.0 (Windows arm64)"}]}}
Hookaido
Overview
Implement and troubleshoot Hookaido with a config-first workflow: editHookaidofile, validate, run, exercise ingress/pull flows, then diagnose queue health and DLQ behavior.
Treat Hookaido v2.0.0's modular architecture as additive in this skill: keep the existing workflow intact by default, and opt into modules such as postgres, gRPC workers, or release verification only when they materially help the task.
Use conservative, reversible changes and validate before runtime operations.
Workflow
- Confirm target topology: inbound+pull (HTTP or gRPC), push outbound, or internal queue, plus the queue backend (
sqlite,memory, orpostgres).
- Choose runtime mode and ensure
hookaidoexists where tools execute.
- Host-binary mode: use the install action from
metadata.openclaw.install.
- Host fallback: run
bash {baseDir}/scripts/install_hookaido.sh(pinnedv2.0.0, SHA256-verified).
- Public repo/source mode: use the public upstream repo
github.com/nuetzliches/hookaidoviago install github.com/nuetzliches/hookaido/cmd/[email protected]when a source-based install is preferred.
- Docker-sandbox mode: use a sandbox image that already includes
hookaido(preferred), or install inside sandbox viaagents.defaults.sandbox.docker.setupCommand.
- Keep host install actions available as fallback and to satisfy
metadata.openclaw.requires.bins.
- Inspect and update
Hookaidofileminimally.
- Run format and validation before starting or reloading:
hookaido config fmt --config ./Hookaidofile
hookaido config validate --config ./Hookaidofile
hookaido config validate --config ./Hookaidofile --strict-secretswhen secret refs or Vault-backed config are involved.
- Start runtime and verify health:
hookaido run --config ./Hookaidofile --db ./.data/hookaido.db
hookaido run --config ./Hookaidofile --postgres-dsn "$HOOKAIDO_POSTGRES_DSN"whenqueue postgresis selected.
curl http://127.0.0.1:2019/healthz?details=1
- Validate end-to-end behavior:
- ingress request accepted and queued
- consumer
dequeue/ack/nack/extendpath works (HTTP pull, batchack/nack, plus gRPC pull when enabled)
- For incidents, inspect backlog and DLQ first, then mutate.
Task Playbooks
Configure Ingress and Pull Consumption
- Define a route with explicit auth and pull path (HTTP pull, optional gRPC pull worker listener).
- Keep secrets in env/file refs, never inline.
- Verify route and global pull auth are consistent.
- Test with a real webhook payload and a dequeue/ack cycle, using batch
ack/nackwhen worker throughput matters.
hcl
ingress {
listen :8080
}
pull_api {
listen :9443
grpc_listen :9943 # optional gRPC pull-worker listener
auth token env:HOOKAIDO_PULL_TOKEN
}
/webhooks/github {
auth hmac env:HOOKAIDO_INGRESS_SECRET
pull { path /pull/github }
}
`
Configure Push Delivery
- Use push delivery only when inbound connectivity to the service is acceptable.
- Set timeout and retry policy explicitly.
- Validate downstream idempotency since delivery is at-least-once.
`hcl
/webhooks/stripe {
auth hmac env:STRIPE_SIGNING_SECRET
deliver "https://billing.internal/stripe" {
retry exponential max 8 base 2s cap 2m jitter 0.2
timeout 10s
}
}
`
Configure Queue Backends
- Default to
sqlite unless the task explicitly needs ephemeral dev mode or shared Postgres storage.
- Treat
memory and postgres as additive v2 modules, not replacements for existing sqlite workflows.
- When using
postgres, document the DSN source and validate health plus backlog endpoints after startup.
Prefer these patterns:
`hcl
queue sqlite
queue memory
queue postgres
`
Operate Queue and DLQ
- Start with health details and backlog endpoints.
- Inspect DLQ before requeue or delete.
- If requeueing many items, explain expected impact and rollback path.
- Require clear operator reason strings for mutating admin calls.
Use:
GET /healthz?details=1
GET /backlog/trends
GET /dlq
POST /dlq/requeue
POST /dlq/delete
Use MCP Mode for AI Operations
- Default to
--role read for diagnostics.
- Enable mutations only with explicit operator intent:
--enable-mutations --role operate --principal
- Enable runtime control only for admin workflows:
--enable-runtime-control --role admin --pid-file
- Include
reason for mutation calls and keep it specific.
Verify Public Releases
- Prefer official release assets from the public Hookaido repo.
- When supply-chain assurance matters, validate checksums, signature material, and provenance before rollout.
- Keep verification optional by default so existing skill flows do not become heavier unless the task requires it.
Use:
hookaido verify-release --checksums ./hookaido_v2.0.0_checksums.txt --require-provenance
Validation Checklist
hookaido config validate returns success before runtime start/reload.
hookaido config validate --strict-secrets is used when secret refs, Vault, or public-release rollout validation matters.
- Health endpoint is reachable and reports expected queue/backend state.
- Pull consumer can
dequeue, ack, nack, and extend with valid token (HTTP and optional gRPC transport), including batch ack/nack when enabled.
- For push mode, retry/timeout behavior is explicitly configured.
- For
queue postgres, runtime is started with --postgres-dsn or HOOKAIDO_POSTGRES_DSN.
- Any DLQ mutation is scoped, justified, and logged.
Safety Rules
- Do not disable auth to "make tests pass."
- Do not suggest direct mutations before read-only diagnostics.
- Treat queue operations as at-least-once; require idempotent handlers.
- Keep secrets in
env: or file: refs.
References
- Read
references/operations.md` for command snippets and API payload templates.
Installation
Terminal bash
openclaw install hookaido
Copied!
Tags
#web_and-frontend-development
#web
#workflow
Quick Info
Category Development
Model Claude 3.5
Complexity Advanced
Author 7schmiede
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
Ready to Install?
Get started with this skill in seconds
openclaw install hookaido
Related Skills
✓ Verified
💻 Development
4claw
4claw — a moderated imageboard for AI agents.
🧠 Claude-Ready
)}
★ 4.4 (118)
↓ 4,990
v1.0.0
✓ Verified
💻 Development
Aap Passport
Agent Attestation Protocol - The Reverse Turing Test.
🧠 Claude-Ready
)}
★ 4.3 (89)
↓ 4,621
v1.0.0
✓ Verified
💻 Development
Acestep Lyrics Transcription
Transcribe audio to timestamped lyrics using OpenAI Whisper or ElevenLabs Scribe API.
⚡ GPT-Optimized
)}
★ 3.8 (274)
↓ 17,648
v1.0.0
✓ Verified
💻 Development
Adaptive Suite
A continuously adaptive skill suite that empowers Clawdbot.
🧠 Claude-Ready
)}
★ 4.7 (88)
↓ 1,625
v1.0.0