Analyst Watchdog
Automated monitoring agent that watches an API scoreboard, detects milestones, writes findings to markdown, and alerts via file-based triggers. Use when you...
MIT-0 · Free to use, modify, and redistribute. No attribution required.
⭐ 0 · 190 · 1 current installs · 1 all-time installs
byNissan Dookeran@nissan
MIT-0
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the actual footprint: a Python3 watchdog that polls a local control-plane API (http://localhost:8765) and writes FINDINGS/OUTBOX/ALERT files into a workspace. Required binary (python3) and lack of declared env/credentials are appropriate for the stated purpose.
Instruction Scope
SKILL.md and the included script limit activity to polling local API endpoints, reading local score/state files, and writing markdown alert files. The instructions do not instruct reading unrelated system paths, contacting external endpoints, or exfiltrating secrets. The agent is intended to run on a schedule (cron/LaunchAgent) which matches the code behavior.
Install Mechanism
No install spec is present (instruction-only with a reference Python script). That is the lowest-risk pattern and consistent with a small monitoring implementation.
Credentials
The skill requests no environment variables or credentials and only requires python3 — proportional to a local polling agent. The hardcoded control-plane base (http://localhost:8765) is consistent with the declared local-only network intent.
Persistence & Privilege
The skill does not request always:true and is user-invocable. It writes files inside a workspace-relative directory and does not modify other skills or system-wide agent settings. Autonomous invocation is allowed but is the platform default.
Assessment
This skill appears internally consistent and limited to polling a localhost control-plane and writing local markdown alerts. Before installing, confirm where the skill will be placed (it writes files relative to the script's workspace path), ensure the localhost API (http://localhost:8765) is the intended target, and verify downstream consumers (an orchestrator or Telegram sender) that read OUTBOX.md / ALERT_TELEGRAM.md are trusted — those consumers could forward alerts externally. Also review the remainder of the truncated script (if any) and consider running the agent in an isolated environment or with limited file-system permissions to prevent accidental overwriting of important files or following symlinks outside the intended workspace.Like a lobster shell, security has layers — review code before you run it.
Current versionv1.0.0
Download ziplatest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📊 Clawdis
Binspython3
SKILL.md
Analyst Watchdog
An autonomous monitoring agent pattern: watch a system, detect changes, write findings, alert when thresholds are crossed. Runs on a schedule (LaunchAgent or cron) without human intervention.
Pattern
API Endpoint → Poll → Detect Changes → Write FINDINGS.md
→ Write OUTBOX.md (for orchestrator)
→ Write ALERT_TELEGRAM.md (urgent)
What It Monitors
Configurable, but the reference implementation tracks:
- Model evaluation scores hitting milestones (n=50, 100, 150, 200)
- Promotion events (model proven equivalent to cloud baseline)
- Score anomalies (sudden drops or improvements)
- System health degradation
Alert Tiers
| File | Urgency | Who Reads It |
|---|---|---|
FINDINGS.md | Low | Background knowledge |
OUTBOX.md | Medium | Orchestrator on next heartbeat |
ALERT_TELEGRAM.md | High | Sent immediately, then deleted |
Files
scripts/analyst_agent.py— Reference watchdog implementation
Files
2 totalSelect a file
Select a file to preview.
Comments
Loading comments…
