Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Openclaw Gateway Manager
v1.0.3Manage OpenClaw gateways: query status, modify ports, restart, verify configs, create, delete instances with backups and port scanning.
⭐ 0· 70·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (manage gateways: status, ports, restart, create/delete, port-scan) align with the provided scripts and docs. The scripts operate on OpenClaw configuration directories under $HOME, create user-level service files, start/stop gateway processes, scan ports, and perform backups — all expected for a gateway manager.
Instruction Scope
SKILL.md instructs the agent to run the bundled shell scripts which read and write files under $HOME, create LaunchAgent/systemd user service files, run openclaw via node, scan local ports, and perform rm -rf deletions. Those actions are within the claimed scope but are destructive (deletes, process control) so the user impact is high and the docs correctly surface the risks and confirmation steps.
Install Mechanism
No install spec is provided (instruction-only from runtime perspective) and code is included as plain shell scripts. Nothing is downloaded from arbitrary URLs or installed automatically — lowest-risk install posture given included code, but user should inspect scripts before running.
Credentials
The skill requests no environment variables or external credentials. It does create service files that run Node and spawn openclaw, and those services may inherit user environment variables at runtime. This is expected for a user-level service manager but means any sensitive env vars present in the user's account could be visible to the launched processes — not a flaw of the skill but an operational consideration.
Persistence & Privilege
Scripts create persistent, user-level services (~/Library/LaunchAgents/ and ~/.config/systemd/user/). The skill does not request system (sudo) privileges and documents that it only creates user-level services. Persistent execution is necessary for its purpose but increases blast radius if misused — the skill includes explicit warnings, backups, and an uninstall/delete flow.
Assessment
This package appears coherent for a gateway manager, but it performs destructive and persistent operations — review before use. Specific recommendations:
- Inspect scripts (especially gateway-delete.sh and create_service_file in common.sh) before running; deletion uses rm -rf even though backups are taken.
- Verify the service file content (LaunchAgent plist / systemd unit). Note the LaunchAgent launches node -e with a JS snippet that spawns openclaw; confirm this behavior and that it doesn't embed unexpected network endpoints.
- Ensure openclaw and node binaries invoked are the expected, trusted binaries on your system (check PATH and /usr/local/bin, etc.).
- Understand backups are stored under $HOME/.openclaw-deleted-backups/ and verify retention and restore procedure before deleting production data.
- Run first in a test account/environment and use the --dry-run / inspect pattern advised by the repo (or add your own dry-run) to confirm actions.
- Be aware user-level services will run persistently under your account and will inherit user environment variables; avoid running with sensitive credentials in your environment if you are concerned about process-level exposure.
If you cannot inspect the code yourself, do not grant it automatic execution in sensitive environments; run it manually in a controlled test environment first.scripts/common.sh:246
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk97fzxgf3fzeg49ann2s81e12583c2vt
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
