OpenClaw Gateway Linux Fix
v1.1.1Fix and diagnose OpenClaw Gateway service issues on Linux. Use when the gateway service shows "disabled" status despite running, when `openclaw gateway statu...
⭐ 1· 96·0 current·0 all-time
byMaks@maksmirnnov
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (OpenClaw Gateway Linux fixes) matches the actions in SKILL.md: editing the user systemd unit, reloading systemd, enabling linger, scheduling cron jobs via the OpenClaw CLI, and setting XDG_RUNTIME_DIR/DBUS env vars. No unrelated credentials, binaries, or network endpoints are requested.
Instruction Scope
Instructions operate on expected paths (~/.config/systemd/user/openclaw-gateway.service, /etc/profile.d, /tmp) and use systemctl, loginctl and the openclaw CLI. They do modify unit files and add env exports; this is within scope but is privileged/system configuration work. Minor scope issues: the python one‑liner assumes the unit file exists and doesn't robustly check errors; the skill instructs scheduling a cron job that will post to Telegram via the gateway (which is expected but worth verifying your openclaw cron permissions and destination ID).
Install Mechanism
Instruction-only skill with no install spec and no code files; nothing will be downloaded or written by an installer. Risk surface is limited to commands the operator runs locally.
Credentials
No environment variables, credentials, or config paths are declared/required beyond the XDG_RUNTIME_DIR/DBUS vars that the skill explicitly adds to the systemd unit and shell profiles. Requesting those variables is proportional to fixing systemd user-bus reachability.
Persistence & Privilege
Skill does not request persistent or platform-wide privileges (always:false). It instructs editing user unit files and /etc/profile.d (the latter requires root), which is appropriate for the stated fixes but requires caution and appropriate privileges.
Assessment
This is an instruction-only troubleshooting guide that is coherent with its purpose, but it performs system configuration changes — back up the unit file before editing (cp ~/.config/systemd/user/openclaw-gateway.service{,.bak}), inspect the proposed python one-liner first, and run commands interactively rather than blindly. Note that writing to /etc/profile.d and enabling linger may require root privileges. Verify the openclaw cron job target (Telegram chat ID) and the permissions of the openclaw CLI on your system before scheduling messages. The absence of scanner findings only means there was no code to statically analyze; it does not replace careful review and testing in a non-production environment.Like a lobster shell, security has layers — review code before you run it.
latestvk97exn2htg9k5pjc4w1qe6sp9s84p585
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
