Deploy Moltbot To Fly
v0.1.3Deploy Moltbot to Fly.io with persistent storage, secure token authentication, environment secrets, and approved device pairing for web UI access.
⭐ 3· 2k·0 current·0 all-time
byPrompt Circle@hollaugo
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The SKILL.md describes exactly how to deploy Moltbot (Clawdbot) to Fly.io — creating app, volume, secrets, config, and approving device pairing — which matches the apparent purpose. However the published metadata lists no required environment variables or credentials even though the instructions explicitly require CLAWDBOT_GATEWAY_TOKEN, ANTHROPIC_API_KEY (and optionally OPENAI_API_KEY). The missing metadata declarations are an inconsistency.
Instruction Scope
The instructions are specific and scoped to deployment: git clone, set Fly secrets, create a config file under /data, deploy, and run a Node one-liner over fly ssh to approve device pairing (reading/writing /data/*.json). These actions require full control of the Fly machine and the app's persistent volume (expected for this task). The instruction to embed the token in a public URL (https://your-app.fly.dev/?token=...) is a potential security concern but is part of the product's pairing flow.
Install Mechanism
There is no install spec in the skill (instruction-only), which is low risk. The SKILL.md recommends installing flyctl via Homebrew or via the official fly install script (curl -L https://fly.io/install.sh | sh). The latter executes a remote script; it's common for CLI installs but carries the usual risk of running remote code — verify the URL and checksum before running if you are cautious.
Credentials
The instructions require several secrets (CLAWDBOT_GATEWAY_TOKEN, ANTHROPIC_API_KEY, optionally OPENAI_API_KEY) and persistent storage, but the skill registry metadata claims no required env vars or primary credential. That mismatch is problematic: the skill will not function without those secrets, and they are not declared upfront. Requesting LLM provider keys and a gateway token is reasonable for a bot that proxies models and pairs devices, but the omission from metadata reduces transparency and prevents automated vetting of credential scope.
Persistence & Privilege
The skill does not request always:true and does not modify other skills or system-wide agent settings. The operations described write to the app's /data volume and set Fly app secrets — these are scoped to the deployed app and are expected for this deployment. Approving device pairing grants access to the bot's device registry, which is necessary for the product flow but is a privileged action the operator should understand.
What to consider before installing
This skill's instructions are plausible for deploying a bot to Fly.io, but pay attention to these issues before installing or following them:
- Metadata mismatch: The registry says no env vars are required, but the guide requires CLAWDBOT_GATEWAY_TOKEN, ANTHROPIC_API_KEY (and optionally OPENAI_API_KEY). Treat that as a transparency gap — expect to supply those secrets.
- Repository trust: The steps clone and run code from github.com/clawdbot/clawdbot. Inspect the repository (Dockerfile, entrypoint, and any scripts) before deploying so you know what code will run in your account.
- Remote install script: The guide suggests curl | sh to install flyctl. Prefer Homebrew or review the install script before executing remote code.
- Token exposure: The pairing flow uses a token in a URL query parameter (https://.../?token=...). That can leak via browser history, logs, or referers. Keep the token secret and rotate it if accidentally exposed.
- Device pairing one-liner: The provided Node command approves pending devices by editing /data JSON files. That operation effectively authorizes devices to access your Moltbot instance — only run it when you understand which pending request will be approved.
- Least privilege: Only store the required LLM provider keys and gateway token as Fly secrets; avoid placing credentials in config files checked into git. Consider using short-lived or scoped API keys where possible.
If you want to proceed: verify the GitHub repo contents, confirm the Fly app and volume names, create and securely store the gateway token, and add only the secrets needed. If anything in the repo looks unexpected or the metadata remains inconsistent, treat the skill as untrusted until clarified.Like a lobster shell, security has layers — review code before you run it.
latestvk9703jw2nx9aafgc95dvhvq7rd808vg1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
