Server

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: server Version: 1.0.0 The skill bundle provides documentation and examples for configuring, deploying, and troubleshooting web servers, application servers, and containerized services. All commands and configuration snippets across SKILL.md, configs.md, and docker.md are standard, legitimate tools and practices for server administration (e.g., `systemctl`, `certbot`, `docker compose`). There is no evidence of intentional harmful behavior, data exfiltration, backdoors, or malicious prompt injection instructions targeting the AI agent. The capabilities, while powerful (e.g., shell access via `docker compose exec`), are directly aligned with the stated purpose of server management and are presented as examples or diagnostic steps, not as instructions for malicious actions.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If copied as-is in the wrong environment, this could expose Traefik administrative or routing information to other reachable services or users.

Why it was flagged

The Traefik example enables the unauthenticated API/dashboard. It is explicit and related to reverse-proxy setup, but can be unsafe if reused in a reachable production environment.

Skill content
- "--api.insecure=true"
Recommendation

Remove `--api.insecure=true` for production, or expose the dashboard only behind authentication and trusted network controls.

What this means

A compromised or misconfigured container with Docker socket access may reveal container metadata or increase impact on the host environment.

Why it was flagged

Mounting the Docker socket lets Traefik inspect Docker state for service discovery. This is a common Traefik pattern, but it expands the container's visibility and privilege boundary.

Skill content
- /var/run/docker.sock:/var/run/docker.sock:ro
Recommendation

Use the Docker socket only when needed, keep Traefik tightly controlled, consider a restricted Docker socket proxy, and avoid exposing the Traefik dashboard/API.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Services created from these examples may keep running after the immediate task and may restart automatically.

Why it was flagged

The instructions show enabling and starting a systemd service so it persists across reboots. That is expected for server deployment and is disclosed, but it changes long-running host state.

Skill content
After creating: `systemctl daemon-reload && systemctl enable myapp && systemctl start myapp`
Recommendation

Confirm service names, users, working directories, and restart policies before enabling services, and document how to stop or disable them.