Azure OpenAI Proxy
v1.0.0Enable Azure OpenAI integration with OpenClaw via a lightweight local proxy. Use when configuring Azure OpenAI as a model provider, when encountering 404 errors with Azure OpenAI in OpenClaw, or when needing to use Azure credits (e.g. Visual Studio subscription) with OpenClaw subagents. Solves the api-version query parameter issue that prevents direct Azure OpenAI integration.
⭐ 3· 1.8k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name, description, SKILL.md and scripts/server.js all describe the same thing: a small Node.js HTTP proxy to rewrite Azure OpenAI URLs for OpenClaw. That capability is coherent with the stated purpose. However, the registry metadata claims no required env vars or binaries, while the SKILL.md and server.js clearly expect Node.js at runtime and environment variables (AZURE_OPENAI_*) — an inconsistency in packaging/metadata.
Instruction Scope
The runtime instructions stay within the declared purpose: run a local proxy, point OpenClaw to it, and forward requests to Azure. The proxy only accepts POST requests with '/chat/completions' and has a health endpoint. Minor scope issues: SKILL.md tells you to copy a systemd file (scripts/azure-proxy.service) but that file is not present in the manifest; SKILL.md also suggests routing subagents through Azure (which is operationally meaningful because it may direct a lot of automated traffic and spend credits).
Install Mechanism
This is instruction-only with a small included Node.js script; there is no installer, no download-from-remote step, and nothing will be extracted. Low install risk. Note: the package lacks an explicit 'requires node' declaration—user must ensure Node.js is available.
Credentials
The code and SKILL.md expect AZURE_OPENAI_ENDPOINT, AZURE_OPENAI_DEPLOYMENT, and AZURE_OPENAI_API_VERSION; they also require sending an Azure API key (via the provider 'api-key' header) but the registry metadata lists no required env vars or primary credential. This mismatch is a packaging/data omission. Functionally, the env vars and API key are proportional to the proxy's job, but verify how you supply the API key and that you keep the proxy bound to localhost.
Persistence & Privilege
always is false and the skill does not request persistent system-wide privileges. The SKILL.md suggests running as a user systemd service (optional); the code does not modify other skills or system settings.
What to consider before installing
What to check before installing and running:
- Trust & provenance: source/homepage unknown. Prefer code from a known author/repo; inspect scripts/server.js yourself (it's small and readable).
- Node requirement: this script requires Node.js but the registry metadata doesn't declare that. Install Node (LTS) if you intend to run it.
- Missing files: SKILL.md references a systemd service file (scripts/azure-proxy.service) that is not included. Do not copy random service files — create your own unit that only binds to 127.0.0.1 and uses your environment securely.
- Keep the proxy local: bind to 127.0.0.1 and do not expose the proxy to the internet (it accepts API keys and will forward requests to Azure). The default bind in code is 127.0.0.1, which is good — keep it.
- API keys & headers: OpenClaw (or subagents) will send your Azure API key in a header to this proxy and the proxy forwards it to Azure. Ensure your system and logs do not leak that key. The server logs status codes and timestamps but does not log bodies or keys; still check your systemd/unit for extra logging.
- Billing impact: if you route subagents through Azure as suggested, automated tasks may consume Azure credits; confirm you want that behavior.
- Packaging metadata mismatch: the registry says no env vars/binaries required while the SKILL.md/code require them. Treat this as a packaging oversight; verify all required env vars are set before running.
If you want to proceed: inspect server.js yourself, run it locally bound to 127.0.0.1, set AZURE_OPENAI_* env vars, configure OpenClaw to point to http://127.0.0.1:18790, and monitor usage and logs closely.Like a lobster shell, security has layers — review code before you run it.
latestvk976dr9dwtn7x737nea1ycwwvd80nkwp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
