.agents/memory/2026-02-25-openclaw-context-overflow-investigation.md

1.3 KiB

2026-02-25 Session Notes

OpenClaw Context Overflow Investigation

Nicholai initiated an investigation into context overflow issues affecting agents running on OpenClaw/ClawdBot. The session focused on tracing how context is assembled and delivered to agents through the Signet daemon.

Investigation Scope

Three primary code paths were identified for investigation:

  1. OpenClaw Adapter (packages/adapters/openclaw/src/) — Runtime plugin that handles agent execution
  2. OpenClaw Connector (packages/connector-openclaw/src/) — Install-time connector that integrates with OpenClaw config
  3. Daemon Hook Handlers (packages/daemon/src/) — Session start and synthesis hooks that assemble context payloads

Investigation Areas

The exploration targeted:

  • Memory injection into agent context (what data, how formatted)
  • Size limits and truncation logic
  • Session start hook response payloads
  • Unbounded data sources that could grow without limit

Initial Findings

An Explore agent was spawned to trace the full data flow from hook request to response payload. The session was interrupted before conclusions were reached.

Next Steps

Complete the context assembly trace, identify unbounded data sources, and propose size limits or truncation strategies for memory injection.