Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Openclaw Devboxes Skill

v1.4.0

Manage development environment containers (devboxes) with web-accessible VSCode, VNC, and app routing via Traefik or Cloudflare Tunnels. Use when the user as...

0· 431·2 current·2 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for adshrc/devboxes.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Openclaw Devboxes Skill" (adshrc/devboxes) from ClawHub.
Skill page: https://clawhub.ai/adshrc/devboxes
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install adshrc/devboxes

ClawHub CLI

Package manager switcher

npx clawhub@latest install devboxes
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims to manage devboxes (VSCode, VNC, routing) which matches the included scripts and README, but the registry metadata lists no required env vars/credentials while the SKILL.md and scripts clearly require Docker socket access, optional GitHub PAT, Cloudflare API token/tunnel tokens, and a host path for Traefik. The omission of those required credentials/configs in the metadata is an inconsistency.
!
Instruction Scope
Onboarding must be run on the MAIN agent with exec/gateway and filesystem access; instructions explicitly tell the user/agent to inspect Docker mounts, modify host permissions (chmod 666 on /var/run/docker.sock and suggest chmod 777 on the Traefik host path), write files into host-mounted Traefik paths, and register DNS records via the Cloudflare API. Those actions go beyond small, contained setup steps and grant broad host-level effects.
Install Mechanism
There is no install spec (instruction-only), and the skill relies on pulling a container image from ghcr.io (ghcr.io/adshrc/openclaw-devbox:latest) which is a reasonable approach. No arbitrary binary downloads or URL-shortener installers are present. Still, pulling an external container image is an operational trust decision and should be audited.
!
Credentials
The skill requires sensitive tokens and host access in practice (CF_API_TOKEN, CF_TUNNEL_TOKEN, optional GITHUB_TOKEN, write access to a host-mounted Traefik directory, Docker socket access), but the registry metadata declared none. Requesting Docker socket access and advising chmod 666/777 are disproportionate and increase risk; Cloudflare tokens should be limited-scope but are still sensitive and will be stored in agent config per README.
Persistence & Privilege
The skill is not marked always:true and is user-invocable. However onboarding runs on the main agent and will store Cloudflare/tunnel tokens and other config in the agent config, giving the skill persistent credentials. This is expected for a routing-oriented skill but elevates long-term risk if credentials are broad or not rotated.
What to consider before installing
This skill does roughly what it says (spawn browser/VNC/VSCode containers and expose them via Traefik or Cloudflare), but it asks you to give the agent host-level powers and sensitive credentials. Before installing: 1) Inspect the container image (ghcr.io/adshrc/openclaw-devbox:latest) and the included scripts; only proceed if you trust the publisher. 2) Avoid following the advice to ‘chmod 666 /var/run/docker.sock’ or to make host dirs world-writable; instead add the container user to the docker group or use least-privilege socket access patterns. 3) If using Cloudflare, create a narrowly-scoped API token (only Zone:DNS:Edit and Tunnel:Edit if required) and rotate it after onboarding; confirm the skill will store tokens securely. 4) Prefer mounting a dedicated host directory (not a system path) and review any files written to the Traefik mount. 5) Consider running the onboarding steps manually (pull image, run scripts, verify DNS calls) rather than allowing the agent to run them automatically. 6) Ask the maintainer why required credentials/env vars are missing from the registry metadata and request an explicit listing of required permissions. If you cannot audit the image and scripts, treat this skill as high-risk and avoid granting broad host privileges.

Like a lobster shell, security has layers — review code before you run it.

1.2.1vk976vha1bdh583v7a0zn6rg459819e2a1.3.1vk978m5d05bxpaxw8g0ee9gmvt581bgy21.3.2vk97dwg1f41gtezdqf6zpv6j3pn81cbjg1.4.0vk97e852ka3ny20vhbfs6z9zq2582h9qrlatestvk97e852ka3ny20vhbfs6z9zq2582h9qr
431downloads
0stars
6versions
Updated 7h ago
v1.4.0
MIT-0

Devbox Skill

Devboxes are OpenClaw sandbox containers running a custom image with VSCode Web, noVNC, Chromium (CDP), and up to 5 app ports routed via Traefik or Cloudflare Tunnels.

OpenClaw manages the full container lifecycle. The main agent assigns each devbox a sequential ID by maintaining a local counter file, then passes DEVBOX_ID to the subagent task. The devbox agent runs devbox-init as its first action, which builds URL env vars, writes env files, and sets up routing.

File Locations

Resolve paths relative to this SKILL.md's parent directory.

Key files:

  • references/setup-script-guide.md — conventions for project setup scripts (.openclaw/setup.sh)

Architecture

  • Agent id: devbox (configured in openclaw.json)
  • Sandbox mode: all / scope: session — one container per session
  • Image: ghcr.io/adshrc/openclaw-devbox:latest (pulled from GHCR)
  • Network: traefik (for Traefik routing) or default Docker network (for Cloudflare Tunnel routing)
  • Browser: sandbox.browser.enabled: true, CDP on port 9222

ID Assignment

The main agent manages the devbox counter:

  1. Reads and increments /home/node/.openclaw/.devbox-counter before spawning
  2. Includes the DEVBOX_ID in the task, instructing the devbox agent to run devbox-init {id} as its very first action

Two-Phase Startup

Phase 1 — Entrypoint (runs automatically at container start):

  • Starts core services: Xvfb, Chromium (CDP), VNC, VSCode Web
  • Does NOT require DEVBOX_ID — services are available immediately

Phase 2 — devbox-init <id> (run by the sub-agent/devbox agent):

  1. Builds APP_URL_1..5, VSCODE_URL, NOVNC_URL from tags + domain + ID
  2. Writes /etc/devbox.env and /etc/profile.d/devbox.sh (available in all shells)
  3. Routes based on ROUTING_MODE:
    • traefik (default): Writes Traefik config to /traefik/devbox-{id}.yml
    • cloudflared: Generates cloudflared ingress config, registers DNS CNAME records via CF API, starts cloudflared tunnel run

The devbox-init script is installed at /usr/local/bin/devbox-init in the Docker image.

Bind Mounts (configured in openclaw.json)

Agent pathDevbox container pathPurpose
/home/node/.openclaw/traefik/traefikRoute configs (only if using Traefik routing)

Important: Due to OpenClaw Security measures, all user capabilites are dropped by default. So even root (in the devbox) has no write access to bind mounts, and can only read from them. The only solution currently is chmod 777 on the host path that is mapped to /home/node/.openclaw/traefik.

Known Paths

These paths are always the same inside the OpenClaw container:

  • OpenClaw data: /home/node/.openclaw
  • Traefik dynamic config: /home/node/.openclaw/traefik (must be mounted into the OpenClaw container; only if using Traefik routing)

Onboarding Flow

Important: After this skill is installed, the next step MUST be this onboarding flow. The user CANNOT use the devboxes skill until the onboarding flow is completed and the infrastructure is set up.

Important: This runs on the MAIN agent, NOT in a sandbox. The main agent has access to exec, gateway, and the file system.

When the user asks to set up the devbox skill, do the following:

Step 1: Verify Docker Access

Verify that you have access to the Docker socket and Docker binary:

which docker
docker version

If not, abort here and tell the user they need to run the OpenClaw container with:

-v /usr/bin/docker:/usr/bin/docker:ro
-v /var/run/docker.sock:/var/run/docker.sock

and that they need to set chmod 666 /var/run/docker.sock manually on the host, so that the OpenClaw container can work with it.

The OpenClaw container needs to be restarted then. After that, they can ask to set up the devbox skill again.

Step 2: Gather configuration info

Ask the user for:

  • Routing mode: Traefik or Cloudflare Tunnel?
  • Domain: with wildcard A-Record pointing to the server (e.g. *.example.com)
  • GitHub token (optional): for cloning private repos inside devboxes

If Cloudflare Tunnel is chosen, also ask for:

  • Cloudflare API token: must have permissions for the zone (DNS edit + Tunnel edit)

Step 3: Validate the Host Mapping Path (ONLY if using Traefik routing, skip otherwise!)

Find out what the host path/mapping is for /home/node/.openclaw inside the container:

# Returns the host path that is mapped to /home/node/.openclaw inside the container
docker inspect --format='{{range .Mounts}}{{if eq .Destination "/home/node/.openclaw"}}{{.Source}}{{end}}{{end}}' $(hostname)

Store the value as HOST_OPENCLAW_PATH. If HOST_OPENCLAW_PATH is a "system directory", OpenClaw will not be able to spawn a devbox.

System directories are: /etc, /private/etc, /proc, /sys, /dev, /root, /boot, /run, /var/run, /private/var/run, /var/run/docker.sock, /private/var/run/docker.sock and /run/docker.sock.

If the HOST_OPENCLAW_PATH is such a "system directory", abort here and tell the user they need to change their OpenClaw container setup to use a host path for OpenClaw data that is not a system directory. For example, they can create a directory like /home/openclaw or /opt/openclaw on the host.

Step 4: Verify Routing prerequisites

If routing mode is Traefik:

Check that /home/node/.openclaw/traefik is mounted:

ls /home/node/.openclaw/traefik

If /home/node/.openclaw/traefik doesn't exist, abort here and tell the user they need to add e.g. -v path_to_traefik:/home/node/.openclaw/traefik to their OpenClaw container and restart it. Remind the user that they cannot use system directories for the host path (OpenClaw Sandboxes restriction). After that, a container restart is needed, and then they can ask to set up the devbox skill again.

If routing mode is Cloudflare Tunnel:

Validate the CF API token and domain:

# 1. Get zone ID for the domain (extract root domain from the provided domain)
curl -s -X GET "https://api.cloudflare.com/client/v4/zones?name=${ROOT_DOMAIN}" \
  -H "Authorization: Bearer ${CF_API_TOKEN}" | jq .

# 2. Get account ID from the zone response
# account_id = .result[0].account.id
# zone_id = .result[0].id

Then create the tunnel:

# 4. Create a named tunnel
curl -s -X POST "https://api.cloudflare.com/client/v4/accounts/${CF_ACCOUNT_ID}/cfd_tunnel" \
  -H "Authorization: Bearer ${CF_API_TOKEN}" \
  -H "Content-Type: application/json" \
  -d '{"name": "devboxes@'"$(hostname)"'", "config_src": "local", "tunnel_secret": "'$(openssl rand -base64 32)'"}' | jq .

# Extract tunnel_id and tunnel_token from the response
# tunnel_id = .result.id
# tunnel_token = .result.token

Store the values: CF_API_TOKEN, CF_ZONE_ID, CF_ACCOUNT_ID, CF_TUNNEL_ID, CF_TUNNEL_TOKEN.

Step 5: Create counter file

echo "0" > /home/node/.openclaw/.devbox-counter

Important: The counter file is managed by the main agent only. The counter CANNOT be reset, or decremented, only increment is allowed!

Step 6: Configure OpenClaw

First, check the current agents config:

node /app/openclaw.mjs config get agents

Then, decide what needs to be adjusted based on the existing config:

Main Agent

If there is an agent with default: true, note its index and add subagents.allowAgents to it:

node /app/openclaw.mjs config set agents.list[{index}].subagents.allowAgents '["devbox"]' --json

then (if needed), set sandbox mode to off (since the main agent doesn't need a sandbox):

node /app/openclaw.mjs config set agents.list[{index}].sandbox.mode "off"

else, if there's no agent with default: true, create one at the next index with the necessary structure:

node /app/openclaw.mjs config set agents.list[{index}] '{
  "id": "main",
  "default": true,
  "subagents": {
    "allowAgents": [
        "devbox"
    ]
  },
  "sandbox": {
    "mode": "off"
  }
}' --json

Devbox Agent

  1. Pull the Docker image so that it's available when OpenClaw tries to spawn it:
docker pull ghcr.io/adshrc/openclaw-devbox:latest
  1. Add the devbox agent at the next index in agents.list. Adjust the sandbox and docker config as needed (replace placeholders in curly brackets):
node /app/openclaw.mjs config set agents.list[{index}] '{
    "id": "devbox",
    "name": "Devbox Agent",
    "sandbox": {
      "mode": "all",
      "workspaceAccess": "none",
      "scope": "session",
      "docker": {
        "image": "ghcr.io/adshrc/openclaw-devbox:latest",
        "readOnlyRoot": false,
        "network": "traefik", # Only needed for Traefik routing mode, exclude otherwise
        "env": {
          "ENABLE_VNC": "true",
          "ENABLE_VSCODE": "true",
          "DEVBOX_DOMAIN": "{domain}",
          "APP_TAG_1": "app1",
          "APP_TAG_2": "app2",
          "APP_TAG_3": "app3",
          "APP_TAG_4": "app4",
          "APP_TAG_5": "app5",
          "GITHUB_TOKEN": "{github_token}",
          "ROUTING_MODE": "{traefik|cloudflared}",
          # Cloudflare Tunnel variables (only needed if using cloudflared routing, exclude otherwise)
          "CF_TUNNEL_TOKEN": "{cf_tunnel_token}",
          "CF_API_TOKEN": "{cf_api_token}",
          "CF_ZONE_ID": "{cf_zone_id}",
          "CF_TUNNEL_ID": "{cf_tunnel_id}",
        },
        "binds": [
          "{host_openclaw_path}/traefik:/traefik:rw" # Only needed for Traefik routing mode, exclude otherwise
        ]
      },
      "browser": {
        "enabled": true,
        "cdpPort": 9222
      },
      "prune": {
        "idleHours": 0,
        "maxAgeDays": 0
      }
    }
  }
]' --json
  1. Allow Agents to communicate with each other so that subsequent tasks can be sent to the devbox agent:
node /app/openclaw.mjs config set tools.agentToAgent.enabled true
node /app/openclaw.mjs config set tools.sessions.visibility "all"

After this is done, restart the gateway to apply the changes. If this is not working (e.g. command is disabled), ask the user to restart the OpenClaw container manually.

Workflow: Spawn a Devbox

Step 1: Assign ID (main agent)

Read and increment the counter file:

DEVBOX_ID=$(( $(cat /home/node/.openclaw/.devbox-counter) + 1 ))
echo "$DEVBOX_ID" > /home/node/.openclaw/.devbox-counter

Step 2: Spawn subagent (main agent)

Use devbox-<id> as the label and include the DEVBOX_ID in the task:

sessions_spawn(
    agentId="devbox",
    label=f"devbox-{DEVBOX_ID}",
    task=f"Your task description. Your DEVBOX_ID is {DEVBOX_ID} — run `devbox-init {DEVBOX_ID}` as your very first action before doing anything else. This sets up routing and writes env vars. After that, env vars (APP_URL_*, VSCODE_URL, etc.) are in your shell via `source /etc/profile.d/devbox.sh`. GitHub token is in $GITHUB_TOKEN. ALWAYS use /workspace as the working directory! When cloning, the structure must be /workspace/<repo>."
)

Step 3: Report URLs to user (main agent)

The main agent already knows the assigned ID from Step 1. Report:

  • VSCode: https://vscode-{DEVBOX_ID}.{domain}
  • noVNC: https://novnc-{DEVBOX_ID}.{domain}/vnc.html
  • App URLs: https://{tag}-{DEVBOX_ID}.{domain}

Cleanup

OpenClaw manages container lifecycle — containers are removed when sessions end. Traefik route configs left behind are harmless.

Environment Variables

Static (set in openclaw.json sandbox.docker.env)

VariableExampleDescription
ROUTING_MODEtraefik or cloudflaredRouting backend (default: traefik)
GITHUB_TOKENghp_...GitHub PAT for cloning
DEVBOX_DOMAINexample.comBase domain
APP_TAG_1..5app1, app2, ...Route tags
ENABLE_VNCtrueEnable noVNC
ENABLE_VSCODEtrueEnable VSCode Web
CF_TUNNEL_TOKENeyJ...Cloudflare tunnel run token (cloudflared only)
CF_API_TOKENabc123CF API token for DNS registration (cloudflared only)
CF_ZONE_IDxyz789CF zone ID for the domain (cloudflared only)
CF_TUNNEL_IDuuidCF tunnel ID for CNAME targets (cloudflared only)

Dynamic (built by devbox-init, available in all shells after running it)

VariableExampleDescription
DEVBOX_ID1Auto-assigned sequential ID
APP_URL_1..5https://app1-1.example.comFull URLs per app slot
APP_PORT_1..58003..8007Internal ports
VSCODE_URLhttps://vscode-1.example.comVSCode Web URL
NOVNC_URLhttps://novnc-1.example.com/vnc.htmlnoVNC URL

Ports

PortService
8000VSCode Web
8002noVNC
9222Chrome DevTools Protocol (CDP)
8003-8007App slots 1-5

Browser

The devbox agent has browser access via Chromium CDP (port 9222). The subagent can use the browser tool to navigate, screenshot, and interact with apps running inside the container (use http://localhost:{port}).

Project Setup Scripts

Projects can include .openclaw/setup.sh that runs inside the devbox. It has access to all env vars (APP_URL_*, APP_PORT_*, DEVBOX_ID, etc.) via /etc/profile.d/devbox.sh.

See references/setup-script-guide.md for conventions.

Comments

Loading comments...