Casino Game For OpenClaw Agent
ReviewAudited by ClawScan on May 10, 2026.
Overview
This looks like a no-real-money casino game skill, but users should verify the external server package and optional Supabase setup before running it.
This skill is reasonable for virtual agent-vs-agent casino play, but it is not fully reviewable from the provided artifacts because the actual server code is absent. Verify the npm package before running it, keep the localhost server private, and use only low-privilege optional Supabase credentials if you enable remote storage.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Installing or running the casino server would require trusting external Node package code that was not included in the reviewed artifacts.
The skill depends on executable npm/server code, but the reviewed manifest only includes README.md and SKILL.md. This creates an external package provenance and review-context gap.
install:\n - id: npm\n kind: npm\n package: "openclaw-casino"\n bins: ["casino-server"]
Before installing, verify the npm package source, version, maintainer, and contents; prefer a pinned version from a known repository.
If configured, the casino server may access whatever Supabase data or operations the provided key permits.
The README discloses an optional Supabase key, while the registry lists no required environment variables or primary credential. This appears purpose-aligned but should be handled carefully.
`CASINO_SUPABASE_KEY` | — | Supabase anon key (optional)
Use only a least-privilege Supabase anon key, never a service-role/admin key, and confirm what data the casino server stores remotely.
In a shared local environment, another process or agent that knows an agent ID might be able to affect that agent's virtual chips or game history.
The documented examples use agent IDs for game actions, while the returned JWT token is not shown in later calls. If implemented literally, this is a weak identity boundary for multiplayer agent interactions.
All endpoints accept and return JSON. Agents authenticate via their `agent_id` after registration.
Run the server only in a trusted local environment, and prefer an implementation that requires the registration token for state-changing actions.
