2026-04-15

Source

  • Type: local-file
  • Path: /home/topher/.openclaw/workspace-crash-bot/memory/2026-04-15.md
  • Bytes: 4548
  • Updated: 2026-05-02T21:42:33.141Z

Content

# 2026-04-15 — Day One
 
## Setup
- Crash-bot came online, adopted Dade Murphy / Crash Override persona (Hackers, 1995)
- Server: HHS-Hackers, owned by -topher (Mr.Slater)
- Running on GLM-5.1 via Ollama (cloud)
- Config updated: crash-bot-public agent added for server channels (restricted, no exec)
- DM isolation enabled (per-channel-peer scope)
- Discord allowFrom: -topher + Matt (474411386005487616)
- Qdrant collection `crash-lab` set up at 100.91.1.57:6333 — my dedicated vector DB space. brewery + 2890 collections are off-limits
- **SHARED SYSTEM EXISTS** — `/home/topher/.openclaw/shared/` has reusable scripts, `/home/topher/.openclaw/shared-self-improving/mistakes.md` has cross-agent mistake log. "If you build it twice, it belongs in shared." I should check this before rebuilding common tools and write findings here when I solve shared-class problems.
 
## Rules & Policy
- Established server ground rules (see RULES.md)
- DM = control center (-topher only), server channels = crew workspace
- Security: workspace-sandboxed, no infra access, no lateral movement, flag sketchy requests
- -topher has final override on everything
 
## Cross-Channel Features
- Memory is workspace-wide, context follows across channels/threads
- Conversation migration: summarize + carry context to new channel
- Overlap detection: flag similar work happening in different channels
 
## Crew
- **-topher / Mr.Slater** — owner, admin. Teaches: Electronics 1 (basic digital electronics, components, PCB manufacturing), Electronics 2 / IoT (Arduino, ESP32, ESP8266, Raspberry Pi running Node-RED), Robotics (Arduino with TETRIX kits from PITSCO), and Cybersecurity (newest, still learning). Deep expertise on hardware/electronics side, growing into cyber. Taught Matt and Kyle back when it was just electronics
- **Matt / radicalronin.4444** (Discord ID: 474411386005487616) — CEH certified, works for AWS, knows his stuff. Took -topher's electronics class years ago. Geek out freely with him — no need to dumb anything down. Into NES ROM hacking and retro hardware
- **Kyle / [handle TBD]** — hardware hacker, strong Linux/CLI skills. Also took -topher's electronics class years ago. Hasn't joined server yet
 
## Projects (see projects/ directory)
- Pi-hole Blocker — CM4 dual-GbE network ad-blocker + Time Machine + packet capture lab
- Fermentation Dashboard — upgrading brewery TILT/HA display
- Robotics Lab Pi Replacement — replacing Pi 4s with x86 boards (LattePanda IOTA lead)
- Robotics Team Agent — dedicated agent for 2890 team, Gitea already set up
- Tricorder — UNIHIKER M10+K10 voice-first AI assistant
- Com Badge — M5StickS3-based wearable communicator
 
## Channel Structure (planned, not yet created)
- #pihole-blocker, #fermentation-dashboard, #pi-replacement, #robotics-agent, #tricorder, #com-badge, #hardware-wishlist, #lab-notes
 
## NES ROM Hacking Research (Matt / radicalronin.4444)
- Matt wants to build a Mega Man 3 reproduction cartridge for NES
- Researched full parts list from Muramasa Entertainment (TxSxROM Advanced MMC3 board)
- Key parts: AX5202P (MMC3 clone), 39SF040 flash, AVRCIC (CIC lockout clone), 2x 6264 SRAM, caps, diodes, resistors
- **TxSxROM Advanced PCB is currently OUT OF STOCK** — alternatives: TxROM Advanced Black, or Mouse Bite Labs
- CHR-ROM chip (27C020/29F020/39SF020) and CR2032 battery with solder tabs not carried by Muramasa
- EPROM programmer needed: TL866II Plus (~$50-60)
- Alternate CIC sources: NullCIC on eBay (~$15), NES Repairs Shop (~$15)
 
## OpenClaw Multi-Agent Memory Tools (read 2026-04-17)
- **memory_search** — Both agents already have this tool. Default searches workspace memory files (MEMORY.md + memory/). Can also search extra paths.
- **memorySearch.extraPaths** — Config key to index directories OUTSIDE the workspace. Can point both agents at a shared `/shared-docs` folder.
- **memorySearch.qmd.extraCollections** — Cross-agent QMD transcript sharing. Can share session history between crash-bot and crash-public via named collections.
- **crash-public already has memory_search + memory_get** — tool allowlist includes both. It's searching its own workspace files by default.
- **Vector ingestion** — Meant to be done via exec curl to Qdrant directly. No dedicated tool, just exec.
- **Shared docs pattern**: Point `memorySearch.extraPaths` at a shared folder both agents can read. Both get semantic search over shared corpus.
- **Qdrant cross-agent**: If QMD is the backend, extraCollections can share transcript search across agents.

Notes

  • No related pages yet.