Mission Control
Analysis
Mission Control is a coherent dashboard skill, but its artifacts show a default no-auth backend with broad mutation and agent-dispatch capabilities that users should review before installing.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
AUTH_MODE=none LOCAL_AUTH_TOKEN= ... HOOK_SECRET=$MC_SECRET
The installer generates a backend configuration with authentication disabled while the skill documents many POST/PATCH/DELETE APIs for projects, tasks, approvals, requests, reviews, library documents, and dispatch state.
By default, Mission Control only listens on `localhost` ... The backend already listens on all interfaces when you set `PORT=8000`
The documentation gives a mixed safety message: it tells users the dashboard is local-only by default, but also states the backend listens on all interfaces, which is risky when auth is disabled.
cp "$SCRIPT_DIR/hook.ts" "$HOOKS_DIR/mission-control-hook.ts" ... openclaw hooks enable mission-control
The installer copies and enables a lifecycle hook so Mission Control continues receiving OpenClaw events after setup.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const HOOK_SECRET = process.env.MISSION_CONTROL_HOOK_SECRET || ""; ... "X-Hook-Secret": HOOK_SECRET ... body: JSON.stringify({ event, agentId, taskId, data, timestamp: new Date().toISOString() })The hook uses a shared secret to authenticate lifecycle-event posts to Mission Control and sends agent/task/session event data to the configured backend.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
GET | `/api/dispatch/pending/:agentId` | Poll for undelivered events. Marks as delivered. ... Mission Control also tries to push them via the gateway's `/hooks/agent` HTTP endpoint and WebSocket `agent` method.
Agent-directed messages can be delivered through gateway push or polled by agentId, and the documented polling endpoint marks messages delivered; combined with default no-auth configuration, origin and permission boundaries are unclear.
When you produce research, reports, documentation, analysis, or any reference material, publish it to the Library so it's organized and searchable.
The skill intentionally stores produced content in a searchable Library, creating persistent context that may include sensitive work product.
