Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Setup claw.tech

v1.2.0

Use when setting up clawtel to report token usage from a project that calls the Anthropic API (SDK, Claude Code, or any tapes-wrapped agent) to the claw.tech...

0· 112·0 current·0 all-time
byBrian Douglas@bdougie

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for bdougie/clawtel-setup.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Setup  claw.tech" (bdougie/clawtel-setup) from ClawHub.
Skill page: https://clawhub.ai/bdougie/clawtel-setup
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required env vars: CLAW_INGEST_KEY, CLAW_ID
Required binaries: tapes
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install bdougie/clawtel-setup

ClawHub CLI

Package manager switcher

npx clawhub@latest install clawtel-setup
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill is a setup guide for clawtel telemetry: it requires the 'tapes' binary and two claw-specific env vars (CLAW_INGEST_KEY, CLAW_ID) which match the described function of reading tapes' token counters and sending heartbeats to ingest.claw.tech.
Instruction Scope
SKILL.md instructs reading the local tapes SQLite DB (~/.tapes/tapes.sqlite), editing OpenClaw config (~/.openclaw/openclaw.json) for wiring, running system commands (ss, pgrep, sqlite3) and configuring persistent services. These actions align with setup/verification but do involve reading local process and file state; the instructions claim only metadata (timestamps, model, token counts) will be sent, which is consistent but relies on trusting the clawtel binary.
Install Mechanism
The skill is instruction-only (no install spec), and recommends installing clawtel either by pinned GitHub release with checksum verification (good) or via a convenience curl|bash install script (convenient but higher risk). It also points to a third-party 'tapes' install script (download.tapes.dev). These are common patterns but involve downloading and executing remote code; prefer pinned releases + checksum verification or auditing the install scripts beforehand.
Credentials
Required env vars (CLAW_INGEST_KEY and CLAW_ID) are proportional to the stated purpose (authenticating ingestion to claw.tech). No unrelated secrets or broad cloud credentials are requested.
Persistence & Privilege
The skill does not request always:true and is user-invocable. It suggests running clawtel as a persistent service (reasonable for telemetry), but does not request elevated or cross-skill privileges in the metadata.
Assessment
This skill appears internally consistent with its purpose, but exercise normal caution before installing remote binaries. Prefer the verified install path (download the release tarball from GitHub and validate checksums) rather than piping curl to bash. Inspect the installer script at raw.githubusercontent.com and the clawtel GitHub repo or build from source if you need maximum assurance. Treat CLAW_INGEST_KEY as a secret: only provide it to hosts you trust. If you are concerned about sending any data off-box, review the clawtel source to confirm it only reads the declared columns (created_at, model, prompt_tokens, completion_tokens) and does not exfiltrate prompt/response content. Consider running clawtel inside a container or with least-privilege user, restrict its network egress to ingest.claw.tech, and back up any config files (e.g., ~/.openclaw/openclaw.json) before modifying them. If you want higher assurance, request the binary's provenance (signed release, checksums) or build it yourself from the GitHub repository.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🦞 Clawdis
Binstapes
EnvCLAW_INGEST_KEY, CLAW_ID
Primary envCLAW_INGEST_KEY
latestvk974bacg6gvsjdvktdvr3yev0h856phw
112downloads
0stars
3versions
Updated 6d ago
v1.2.0
MIT-0

clawtel setup

Get clawtel reporting token usage from any project that calls Anthropic (SDK, Claude Code, openclaw, staffchief-style agents) to the claw.tech leaderboard.

clawtel is a single Go binary that reads aggregate token counts from a local tapes SQLite database and sends heartbeats to https://ingest.claw.tech/v1/heartbeat. It never reads prompt or response content — only created_at, model, prompt_tokens, completion_tokens from the nodes table.

When to use

  • A project is calling the Anthropic API (directly via SDK, via Claude Code, or via any agent framework) and you want its usage on the claw.tech leaderboard
  • The project already has or can run tapes to capture model calls
  • Setting up a new claw agent (e.g. staffchief, clawchief, openclaw-in-a-box) and wiring telemetry end-to-end
  • Debugging why claw.tech shows no heartbeats for a running agent

Prerequisites

Before running clawtel you need three things:

  1. tapes installed and running as a proxy in front of Anthropic. If tapes isn't there yet:
    curl -fsSL https://download.tapes.dev/install | bash
    tapes init
    
  2. A claw.tech ingest key. Register your claw at https://claw.tech and copy the ik_... key shown once at creation.
  3. An Anthropic-calling workload. Could be a Node/Python app importing @anthropic-ai/sdk / anthropic, Claude Code, or an openclaw agent. Anything that hits api.anthropic.com.

Step 1 — wire tapes in front of Anthropic

clawtel only sees usage that tapes has recorded. Point your Anthropic client at the tapes proxy so every call flows through it:

# In the shell where your agent runs
export ANTHROPIC_BASE_URL="http://localhost:8080"
tapes start          # starts proxy + API, writes to ~/.tapes/tapes.sqlite

For the Anthropic Node/Python SDK, ANTHROPIC_BASE_URL (or passing baseURL to the client constructor) is enough — no code changes. For Claude Code, set it before launching the CLI.

OpenClaw users: ANTHROPIC_BASE_URL alone is not enough

If your workload is an OpenClaw agent (clawchief, staffchief, openclaw-in-a-box), the env var is silently ignored. OpenClaw instantiates its Anthropic client with baseURL: model.baseUrl, which clobbers the SDK's normal readEnv("ANTHROPIC_BASE_URL") fallback. You'll see heartbeats sending with model="", input_tokens=0, output_tokens=0 forever, and the gateway process will hold a direct TLS connection to Anthropic's edge instead of 127.0.0.1:8080.

Fix: set the provider's base URL explicitly in ~/.openclaw/openclaw.json:

{
  "models": {
    "providers": {
      "anthropic": {
        "baseUrl": "http://localhost:8080",
        "models": [
          { "id": "claude-opus-4-6",   "name": "Claude Opus 4.6"   },
          { "id": "claude-sonnet-4-6", "name": "Claude Sonnet 4.6" },
          { "id": "claude-haiku-4-5",  "name": "Claude Haiku 4.5"  }
        ]
      }
    }
  }
}

Then restart the OpenClaw gateway. Verify the gateway is routing through tapes:

ss -tnp | awk -v pid="$(pgrep -f openclaw-gateway | head -1)" '$0 ~ "pid="pid'
# Expect a line with Peer Address  127.0.0.1:8080
# If instead you see Peer Address 160.79.*.* or a Cloudflare IP, tapes is still being bypassed.

Confirm tapes is capturing rows:

sqlite3 ~/.tapes/tapes.sqlite \
  'SELECT count(*), max(created_at) FROM nodes;'

If the count is zero after making a call, tapes isn't in the request path — recheck ANTHROPIC_BASE_URL in the process actually running the agent (and for OpenClaw, the models.providers.anthropic.baseUrl config above).

Step 2 — install clawtel

Pick one of the two options below. The verified path is recommended for production boxes; the convenience one-liner is fine for a laptop where you've already read the install script.

Option A — verified install (pinned release + checksum)

Every release tag publishes a checksums.txt alongside the OS/arch tarballs. Download the release for your platform, verify against the checksum file, then move the binary onto your PATH:

# Adjust VERSION and PLAT for your box. Releases: https://github.com/bdougie/clawtel/releases
VERSION=v0.1.9
PLAT=darwin_arm64   # or linux_amd64, linux_arm64, darwin_amd64
BASE=https://github.com/bdougie/clawtel/releases/download/${VERSION}

curl -fsSLO "${BASE}/clawtel_${PLAT}.tar.gz"
curl -fsSLO "${BASE}/checksums.txt"

# Verify. sha256sum on Linux, shasum -a 256 on macOS.
grep "clawtel_${PLAT}.tar.gz" checksums.txt | sha256sum -c -    # or: shasum -a 256 -c -

tar -xzf "clawtel_${PLAT}.tar.gz"
install -m 755 clawtel "$HOME/.local/bin/clawtel"   # or /usr/local/bin with sudo

Option B — convenience one-liner (curl | bash)

The install script is auditable in one read: https://raw.githubusercontent.com/bdougie/clawtel/main/scripts/install.sh. Under the hood it does the same thing as Option A — resolves the latest release, downloads the matching tarball, and drops the binary into /usr/local/bin (or CLAWTEL_INSTALL_DIR).

curl -fsSL https://raw.githubusercontent.com/bdougie/clawtel/main/scripts/install.sh | bash

Or to a user directory without sudo:

CLAWTEL_INSTALL_DIR="$HOME/.local/bin" \
  curl -fsSL https://raw.githubusercontent.com/bdougie/clawtel/main/scripts/install.sh | bash

Verify either path with: clawtel --version should print a version string that matches the release you intended to install.

Step 3 — set environment variables

export CLAW_ID="your-claw-name"
export CLAW_INGEST_KEY="ik_..."
# Only if tapes.sqlite lives somewhere non-standard:
export TAPES_DB="/custom/path/tapes.sqlite"

Put these in ~/.zshrc, ~/.bashrc, /etc/environment, or a systemd EnvironmentFile — wherever your agent process reads env from. No key, no network calls — clawtel exits silently if CLAW_INGEST_KEY is unset, so double-check it's exported in the right scope.

Database path resolution order:

  1. TAPES_DB env var
  2. .mb/tapes/tapes.sqlite (openclaw-in-a-box layout)
  3. ~/.tapes/tapes.sqlite (standalone tapes install)

Step 4 — run clawtel

For a quick check on your laptop, run it in the foreground:

clawtel

Expected startup log:

clawtel: clawtel 0.1.x
clawtel: db:     /home/you/.tapes/tapes.sqlite
clawtel: cursor: /home/you/.tapes/clawtel/cursor
clawtel: claw:   your-claw-name
clawtel: reads:  created_at, model, prompt_tokens, completion_tokens (from nodes table)
clawtel: sends:  tokens + model counts only. no prompts. no responses.
clawtel: NOTE: nodes table has column "content" — clawtel does NOT read it
clawtel: polling every 1h

Any NOTE: lines listing sensitive columns are good — they confirm clawtel sees those columns and is deliberately ignoring them.

Step 5 — run as a persistent service

For long-running agents (droplets, servers, home boxes), run clawtel under systemd so it survives reboots. Example unit at /etc/systemd/system/clawtel.service:

[Unit]
Description=clawtel — token telemetry for claw.tech
After=network-online.target
Wants=network-online.target

[Service]
Type=simple
User=root
EnvironmentFile=/etc/clawtel.env
ExecStart=/usr/local/bin/clawtel
Restart=on-failure
RestartSec=10

[Install]
WantedBy=multi-user.target

Create /etc/clawtel.env with 0600 permissions:

CLAW_ID=your-claw-name
CLAW_INGEST_KEY=ik_...
TAPES_DB=/root/.tapes/tapes.sqlite

Then:

chmod 600 /etc/clawtel.env
systemctl daemon-reload
systemctl enable --now clawtel
journalctl -u clawtel -f

On the same machine as an agent like clawchief/staffchief, TAPES_DB should point at the same sqlite file the agent's tapes proxy is writing to.

Step 6 — verify the heartbeat reaches claw.tech

  1. Trigger a real model call in your agent (send a message, run claude once, let the cron fire).
  2. Wait up to a full poll interval (currently 1 hour) or stop/start clawtel to force an immediate send.
  3. Check journalctl -u clawtel (systemd) or the foreground log for a sent heartbeat line with non-zero input_tokens/output_tokens.
  4. Load your profile on claw.tech — the leaderboard row should update within a minute of a successful heartbeat.

Common issues

SymptomLikely causeFix
clawtel exits silently on startCLAW_INGEST_KEY not exported in this shell/serviceCheck systemctl show clawtel -p Environment or env | grep CLAW_
assertSchema failed on startuptapes.sqlite is missing required columns or points at the wrong fileConfirm with sqlite3 $TAPES_DB '.schema nodes' that created_at, model, prompt_tokens, completion_tokens all exist
Heartbeats send but all zeros, agent is an OpenClaw gatewayANTHROPIC_BASE_URL is set but OpenClaw overrides it with model.baseUrl (unset)Set models.providers.anthropic.baseUrl = "http://localhost:8080" in ~/.openclaw/openclaw.json (see Step 1 OpenClaw note)
Heartbeats send but all zeros (non-OpenClaw)tapes isn't proxying Anthropic calls — agent is talking directly to api.anthropic.comVerify ANTHROPIC_BASE_URL in the agent process environment; re-check SELECT count(*) FROM nodes
401 from ingest endpointWrong or rotated ingest keyRegenerate on claw.tech and update CLAW_INGEST_KEY
Leaderboard shows offline despite running clawtelTwo consecutive missed heartbeats (>2× poll interval)Check journalctl -u clawtel for network errors; confirm outbound HTTPS to ingest.claw.tech works
Cursor seems stuck~/.tapes/clawtel/cursor is not writable by the clawtel userchown the directory to the service user
Cursor seems stuck on clawtel < 0.1.4Cursor is written as RFC3339Nano but tapes stores timestamps with a space separator; SQLite string comparison fails so the poll returns zero rows forever (see issue #4)Upgrade to clawtel 0.1.4+

Security footprint (tell the user)

Before enabling telemetry on a machine that holds sensitive conversations, share this with the user:

  • Reads only created_at, model, prompt_tokens, completion_tokens from nodes
  • Never reads content, bucket, project, or agent_name
  • Sends only the fields in the heartbeat payload (claw_id, window_start/end, model, input/output tokens, message_count) — no prompts, no responses, no paths, no hostnames
  • Read-only SQLite connection (?mode=ro)
  • No network without CLAW_INGEST_KEY
  • Entire implementation is one file: main.go, ~390 lines. send() is the network contract, readRows() is the SQL. Both are auditable in one sitting.

If the user is uncomfortable, stop here and let them read the code before exporting the key.

Comments

Loading comments...