Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

OpenClaw Watchdog Li

v1.0.0

OpenClaw Gateway 看门狗技能。监控 OpenClaw Gateway 进程存活、WebSocket 错误、飞书/企业微信/微信通道状态、网络连通性。在检测到异常时自动重启 Gateway(最多2次,10分钟窗口),并记录通道暂停状态。当 OpenClaw Gateway 无响应、通道报错、sess...

0· 106·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for lxwseeyouaska/openclaw-watchdog-liwg.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "OpenClaw Watchdog Li" (lxwseeyouaska/openclaw-watchdog-liwg) from ClawHub.
Skill page: https://clawhub.ai/lxwseeyouaska/openclaw-watchdog-liwg
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-watchdog-liwg

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-watchdog-liwg
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description (monitor Gateway, channels, network, auto-restart) align with the provided runtime script and SKILL.md. The script checks systemd, port, process name, reads gateway logs, checks channels, disables proxies, and restarts the gateway — all consistent with a gateway watchdog.
Instruction Scope
The SKILL.md instructs running the included bash script or deploying a systemd user service, which matches the script. The script reads gateway logs under /tmp/openclaw-*.log, uses journalctl, and writes state files under /tmp. It also edits ~/.bashrc and can move /etc/profile.d/proxy.sh — these are broader system changes than simple monitoring and should be reviewed before use.
Install Mechanism
No install spec; this is an instruction-only skill with an included shell script. No external downloads or package installs are performed, which minimizes install-time risk.
Credentials
The skill declares optional environment variables for log paths and thresholds but requires no secrets. However, the script calls 'sudo mv /etc/profile.d/proxy.sh ...' and uses systemctl --user set-environment and sed on ~/.bashrc — operations that affect system/user environment and may require elevated privileges. That elevated permission requirement is not surfaced in the metadata.
Persistence & Privilege
always is false and the skill does not request persistent platform-level privileges. Running it as a systemd user service will allow autonomous periodic checks and actions, which is expected for a watchdog. It does not modify other skills or agent-wide configs.
Assessment
This skill appears to do what it says: monitor OpenClaw Gateway and attempt recovery. Before installing or running it, review the script line-by-line and test in a safe environment. Pay attention to: 1) the script attempts to move /etc/profile.d/proxy.sh using sudo (will require sudo rights and will change system proxy configuration); 2) it edits ~/.bashrc to comment proxy exports and uses systemctl --user set-environment to clear proxy env vars — these are persistent environment changes; 3) it uses pkill and runs 'openclaw gateway start' (ensure the 'openclaw' binary on PATH is the expected trusted program); 4) log and state files are under /tmp — consider changing paths and file permissions. If you do not want it to modify system proxy settings or require sudo, remove or adjust the disable_proxy() section before use. Test behavior (restarts and restart-count logic) on a non-production instance to confirm it matches your operational requirements.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ef6herv6dx9stktp6st4g7183vpsd
106downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

OpenClaw Watchdog

监控 OpenClaw Gateway 运行状态,支持多通道检测和自动恢复。

核心功能

  • 进程检测:使用 systemd + 端口 + 进程名三重检测,避免误报
  • 通道监控:飞书、企业微信、微信通道的 session 过期和错误检测
  • 网络检测:百度/阿里 DNS 连通性检测
  • 自动重启:最多 2 次重启,10 分钟冷却窗口
  • 代理管理:网络异常时自动禁用系统代理

使用方式

手动运行

bash /path/to/openclaw-watchdog/scripts/watchdog.sh [interval]
# interval: 检测间隔(秒),默认 300(5分钟)

Systemd 服务部署

[Unit]
Description=OpenClaw Watchdog
After=network-online.target

[Service]
ExecStart=/bin/bash /path/to/openclaw-watchdog/scripts/watchdog.sh 300
Restart=always
RestartSec=10

[Install]
WantedBy=default.target

部署命令:

systemctl --user enable openclaw-watchdog.service
systemctl --user start openclaw-watchdog.service

配置参数(环境变量)

变量默认值说明
LOG_FILE/tmp/openclaw_watchdog.log日志文件路径
PID_FILE/tmp/openclaw_gateway.pidGateway PID 文件
MAX_RESTARTS2最大重启次数
RESTART_WINDOW600重启窗口(秒)
OPENCLAW_PORT18789Gateway 端口

日志文件

  • 主日志:/tmp/openclaw_watchdog.log
  • Gateway 日志:/tmp/openclaw_gateway.log
  • 通道暂停状态文件:
    • /tmp/openclaw_feishu_paused
    • /tmp/openclaw_wecom_paused
    • /tmp/openclaw_weixin_paused
    • /tmp/openclaw_proxy_disabled

通道错误识别

通道错误关键词说明
飞书feishu.*error, lark.*error, session.*expiredsession 过期需等待
企业微信wecom.*error, wechat.*work.*error服务端错误
微信errcode.*-14, session.*expired暂停 60 分钟自动恢复

注意事项

  • 微信 errcode -14 是微信官方限制,看门狗只能记录状态,无法提前解除
  • 飞书/企业微信 token 过期需手动刷新授权
  • 频繁重启可能导致通道被微信封禁,发现后会自动停止重启

Comments

Loading comments...