← Back to Tutorials
Troubleshooting · 4 min

Applied Security Hardening and Now Your Agent Is "Broken"?

This usually means your restrictions are too broad, overlapping, or blocking normal tool execution—not that the model failed.

Fast reality check

If your agent can still chat but can’t do actions, you likely hit a policy collision:

2-minute recovery flow (safe rollback)

  1. Run one tiny canary task.
    Ask for: Create a file named canary.txt containing OK and show the full path.
  2. If canary fails, revert only the newest hardening block.
    Don’t wipe everything. Remove one recent policy cluster, then retest.
  3. Re-enable guardrails one-by-one.
    Add back exactly one restriction, run canary again, continue.
  4. Stop at first failure.
    The last re-added rule is likely the blocker. Tune that rule only.

This finds the exact bad rule fast without losing your full security posture.

High-friction mistakes to avoid

If you copied hardening commands from OpenClaw docs into a HeyRon container

This is a common break pattern from community reports: settings that are safe for direct OpenClaw self-hosting can block HeyRon’s managed gateway path.

Important: if rollback does not restore behavior quickly, open a support ticket and note that the break started immediately after applying docs.openclaw.ai/security recommendations.

Copy/paste recovery prompt

Act as a rollback assistant. First run one tiny canary task and report pass/fail with evidence. If fail, identify the most recently added security/policy block, disable only that block, and rerun the canary. Repeat one change at a time until pass. Then list which exact rule caused failure and provide a narrower safer replacement instead of broad deny rules.

When to escalate to #help

Post exact policy text (redact secrets) so support can identify collision patterns quickly.