Acpx Connection Troubleshooting
v1.0.0用于排查 acpx 桥接连接失败、超时或初始化卡住的问题。当用户提到 acpx 无法连接、ACP 桥接超时、gateway.token 缺失、Claude Code 认证失败、initialize 阶段卡住、或尝试将微信/飞书渠道切换到 ACP 后端时触发。涵盖配置验证、令牌文件修复、模型端点检查及网络连通性测试...
⭐ 0· 74·1 current·1 all-time
byRoger@roger0808
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
medium confidencePurpose & Capability
Name and description match the included SKILL.md and reference files: the guidance is focused on diagnosing acpx <-> OpenClaw Gateway and Claude Code CLI issues. However, the skill metadata declares no required binaries or env vars while the instructions assume the presence of acpx and Claude Code CLI and access to local config files (~/.claude/config.json, ~/.openclaw/openclaw.json). This is a minor inconsistency (missing declared runtime dependencies) but explainable for an instruction-only skill.
Instruction Scope
The SKILL.md explicitly instructs reading and writing local config and credential files (e.g., inspect ~/.claude/config.json and create ~/.openclaw/gateway.token), running acpx and acpx openclaw commands, and checking network endpoints. All of these actions are directly relevant to the troubleshooting purpose. Warning: the skill tells operators how to create/overwrite an authentication token file, which is sensitive behavior — it's necessary for the stated task but should be done carefully and with user consent.
Install Mechanism
Instruction-only skill with no install spec and no code files; this minimizes installation risk because nothing is downloaded or written at install time.
Credentials
The skill declares no required environment variables but will access local credential/config files that contain secrets (API keys, gateway.token). Accessing those files is proportionate to the troubleshooting goal, but the omission of these accesses in the declared requirements reduces transparency and increases the need for caution.
Persistence & Privilege
The skill is not always-enabled and does not request global privileges. It does instruct creating/updating a local auth file (~/.openclaw/gateway.token), which is within the scope of fixing Gateway auth but is a privileged local write — the action is acceptable for the stated purpose but should be performed only after verifying token provenance and backing up existing files.
Assessment
This skill appears to do what it claims (diagnose acpx <> Gateway and Claude CLI issues), but it will read and may overwrite sensitive local files (e.g., ~/.claude/config.json, ~/.openclaw/openclaw.json, and ~/.openclaw/gateway.token). Before using or installing: (1) verify you have acpx and Claude Code CLI installed (the SKILL.md assumes these but the metadata doesn't declare them); (2) back up openclaw.json and any token files before making changes; (3) never paste real tokens into untrusted interfaces — prefer extracting the token locally (e.g., grep/jq from openclaw.json) and manually confirm any token you write; (4) prefer running the suggested commands yourself rather than granting an automated agent blanket write access; (5) confirm the skill source/trustworthiness since the package metadata lists no homepage and the owner is unknown. If you cannot or do not want an automated agent to read/write local credentials, perform the troubleshooting steps manually instead.Like a lobster shell, security has layers — review code before you run it.
latestvk970f521k7v83ehb9xs0c2726x84cdt0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
