Service Watchdog
Analysis
The skill mostly matches its monitoring purpose, but its TCP fallback can run a shell command built from config values, so a crafted watchdog configuration could execute local commands.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
timeout "$timeout_s" bash -c "echo >/dev/tcp/${host}/${port}"The TCP fallback builds a bash -c command string using host and port values that come from the watchdog configuration, without visible validation or safe argument passing.
local curl_args=(-s -S -o "$body_file" -D "$header_file" -w '%{http_code}' ... -X "$method" -L --insecure)HTTPS health checks deliberately disable TLS verification while following redirects. This can be useful for self-hosted services but means a successful HTTP check is not proof the certificate chain or hostname is trusted.
Add to your OpenClaw cron for continuous monitoring: ... Every 5 minutes ... Run `bash skills/service-watchdog/watchdog.sh --json`
The documentation encourages recurring scheduled execution. This is disclosed and aligned with monitoring, but it creates ongoing autonomous checks if the user enables it.
Required binaries (all must exist): none
The registry metadata does not declare required binaries, while SKILL.md says the script requires tools such as curl, openssl, nc/ncat, dig/nslookup, and jq.
