Back to plugin
Pluginv1.6.2
ClawScan security
Nexus Hub Channel · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 4, 2026, 3:06 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The plugin's code and instructions broadly match a Nexus Hub channel, but there are inconsistencies (undeclared environment usage and baked-in example endpoints) that you should review before installing.
- Guidance
- What to check before installing: - Confirm the hub2d endpoint: README/examples use ws://111.231.105.183:3001 and related curl checks — verify you trust that host or replace with your own Nexus Hub URL. Do not assume example IPs are safe. - Environment variable usage: the code will read process.env.NEXUS_API_KEY as a fallback for nexusApiKey even though the skill metadata lists no required env vars. If you set NEXUS_API_KEY in your environment it will be used for Hub HTTP requests; avoid putting high-privilege keys in your shell environment unless intended. - Gateway token and local network calls: the plugin calls a local OpenClaw gateway at 127.0.0.1:<gatewayPort> to perform chat completions. Ensure that local gateway is the one you expect and that its tokens are limited in scope. - Sandbox first: install and test the plugin in an isolated/dev OpenClaw node (or VM/container) to observe outbound connections (hub2d host and local gateway) and verify behaviour before deploying into production. - Review provenance: prefer installing from the official OpenClaw registry or a vetted npm package; if using the included tarball, verify package contents and signatures. - If you need help interpreting any of the code paths that call external endpoints (hub context API, /api/agents, or local gateway), ask for a focused code walkthrough. Additional information that would raise confidence: explicit documentation in metadata about NEXUS_API_KEY usage, a trusted homepage or repository with maintainer/issue history, and confirmation that example IPs are placeholders.
Review Dimensions
- Purpose & Capability
- noteThe code implements a WebSocket-based Nexus Hub channel (room events, context fetch, A2A dispatch, resume tokens, local gateway calls) which matches the name/description. The presence of many source files and bundled tarballs aligns with a full plugin implementation rather than a tiny instruction-only helper.
- Instruction Scope
- okSKILL.md stays within channel plugin scope: it documents install via OpenClaw, config locations (~/.openclaw/openclaw.json), resume token path (~/.openclaw/state/nexus-resume.json), and an SSH tunnel option. It does not instruct reading arbitrary user files or exfiltrating data beyond interacting with Nexus Hub and the local OpenClaw gateway.
- Install Mechanism
- noteNo automated install spec is provided (instruction-only install flow), but full source and packaged tgz files are included in the bundle — installs are expected via the OpenClaw plugin manager or npm pack. There is no remote download during install from an unknown server in the provided manifests.
- Credentials
- concernRegistry metadata declares no required env vars, but the code (hub/api-client.js) will fall back to process.env.NEXUS_API_KEY when building Hub HTTP auth headers. The plugin also expects a gateway token (configured in OpenClaw config) and makes network calls to hub2d (configurable, example IP 111.231.105.183) and to a local gateway (127.0.0.1:port). The fact that an environment variable can influence outbound auth is not documented in the SKILL.md/metadata — this mismatch is the main proportionality concern.
- Persistence & Privilege
- okThe plugin persists resume tokens to ~/.openclaw/state/nexus-resume.json and updates OpenClaw config via the documented setup flow; it does not request always:true or modify other skills' configs beyond normal channel setup. Autonomous invocation is allowed (default) which is expected for a channel plugin.
