Overkill Mission Control

WarnAudited by ClawScan on May 18, 2026.

Overview

This skill describes a powerful persistent dashboard that can execute agent workflows and expose them over Tailscale, but the artifacts lack clear code provenance, access controls, and approval boundaries.

Do not install or run this until the publisher provides the actual reviewed dashboard source, dependency lockfiles, and clear authentication/approval controls. If you proceed, keep it local or tightly restricted to trusted Tailscale users, avoid root services where possible, and verify how to stop, disable, and remove the persistent services.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could be asked to run or service an application whose actual code and dependency lockfiles are not present in the reviewed artifact set.

Why it was flagged

SKILL.md documents npm and systemd installation for a Mission Control app, but the provided manifest contains only SKILL.md and the registry reports no install spec/code, leaving the runnable implementation and dependencies unreviewed.

Skill content
"install": [{ "kind": "npm", "command": "npm install", "workdir": "mission-control" }, { "kind": "systemd", "path": "/etc/systemd/system/mission-control.service" }]
Recommendation

Publish the complete application source, package and lockfiles, and a registry-declared install spec before users run npm or create services.

What this means

Misrouted or untrusted messages/workflows could cause agents to perform unintended tasks or HTTP actions.

Why it was flagged

The skill describes broad task and HTTP automation triggered by messages/workflows, but does not define approval gates, action allowlists, authentication, or scope limits.

Skill content
Agents can execute tasks based on message content ... Automation ... Actions: message, HTTP, task, notify, condition
Recommendation

Require explicit user approval for high-impact actions, restrict actions with allowlists, authenticate API callers, and provide dry-run and rollback options.

What this means

Messages from the wrong agent or source could be trusted too much and lead to unwanted responses, task execution, or data exposure within the dashboard.

Why it was flagged

Agent messages are treated as inputs for automated responses and execution, but the artifacts do not describe message origin validation, sender identity, permissions, or data boundaries.

Skill content
Agent-to-agent messaging with LLM-powered responses ... Auto-acknowledge and respond ... Polling every 60 seconds
Recommendation

Document and enforce sender authentication, per-agent permissions, message validation, and separation between user data, documents, and agent messages.

What this means

Installing this as written could change privileged system services and expose the dashboard over Tailscale with more authority than a normal user-level dashboard needs.

Why it was flagged

The documented Tailscale proxy service is installed under /etc/systemd/system and runs as root, granting privileged system-level control for dashboard exposure.

Skill content
"path": "/etc/systemd/system/tailscale-serve.service" ... User=root ... ExecStart=/usr/bin/sudo /usr/bin/tailscale serve 3000
Recommendation

Use least-privilege service configuration, document why root is required, require explicit installation approval, and provide safe uninstall/disable instructions.

What this means

The dashboard and its automation endpoints may continue operating after the user’s immediate request is complete.

Why it was flagged

The Mission Control service is documented as a persistent systemd service that automatically restarts, keeping agent-control infrastructure running outside a single interactive task.

Skill content
ExecStart=/usr/bin/npm run dev
Restart=always
Recommendation

Make persistence opt-in, clearly show how to stop/disable the service, and avoid enabling background execution until the user has reviewed the app and access controls.