IoT Platform Connection

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This WIP guide is transparent about its purpose, but it connects an agent to an IoT gateway that can command devices, send messages, and run gateway tasks without documented guardrails.

Review carefully before installing or configuring. Use this only if you intentionally want Claude Code or another MCP client to interact with your OpenClaw IoT gateway. Prefer local loopback mode, avoid public exposure unless necessary, protect the gateway password, and require human approval for device commands, channel messages, and gateway agent tasks.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Once enabled, an agent with access to this MCP server may be able to operate IoT devices, send channel messages, or run gateway tasks if a prompt or mistaken tool plan triggers those actions.

Why it was flagged

These MCP tools can mutate physical/device state, send communications, and start gateway-side agent tasks. The guide does not document approval prompts, tool allowlists, target restrictions, or recovery controls.

Skill content
`openclaw_device_command` | Send a command to a specific device ... `openclaw_channel_send` | Send a message through a channel ... `openclaw_agent_run` | Run an agent task on the gateway
Recommendation

Only enable the MCP server when you intentionally want agent control. Use tool allowlists or read-only mode if available, require manual confirmation for device commands/channel sends/agent runs, and review gateway logs.

What this means

If remote access is misconfigured or the password leaks, another client could potentially reach sensor/config data or device/channel control tools.

Why it was flagged

The skill describes exposing the MCP gateway beyond the local machine, including a public mode. Because the same gateway exposes sensor/config resources and command tools, unclear identity, origin, and permission boundaries are material.

Skill content
For remote access via Tailscale: ... "url": "http://openclaw-desktop:18789/mcp" ... `Tailscale Funnel (public with auth)` ... `Publicly accessible with password authentication.`
Recommendation

Prefer loopback access. If remote access is necessary, use Tailscale ACLs, avoid public Funnel unless required, use a strong unique password, verify transport security, and monitor/rotate credentials.

What this means

Anyone who obtains the gateway password may be able to access the configured MCP gateway capabilities.

Why it was flagged

The guide references a gateway password for authenticated access. This is expected for the described Funnel mode, but users should recognize that it protects access to the gateway's capabilities.

Skill content
Ensure the password in your MCP config matches the one in `~/.openclaw/gateway.yaml`.
Recommendation

Store the password only in private user-level configuration, avoid committing it to project settings, and rotate it if it may have been exposed.