WebChat HTTPS Proxy
Analysis
The skill mostly matches its HTTPS proxy purpose, but it installs a persistent local service, reads the OpenClaw gateway token, and its uninstall script can remove more gateway origins than it added.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
cu['allowedOrigins'] = [o for o in orig if f':{port}' not in o]The uninstall script removes every allowed origin containing the configured port, not only the exact HTTPS origin that this skill added.
Restart=always ... systemctl --user enable --now openclaw-voice-https.service
Deployment creates and enables a user systemd service that restarts automatically and remains active beyond the initial deploy command.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
cfg_path = os.path.join(Path.home(), ".openclaw", "openclaw.json") ... return cfg.get("gateway", {}).get("auth", {}).get("token", None)The proxy reads the local OpenClaw gateway auth token from the user's config so it can compare Bearer tokens for /transcribe requests.
