Agent Dashboard

ReviewAudited by ClawScan on May 10, 2026.

Overview

The dashboard is purpose-aligned, but its web tiers can expose and publicly modify operational status data despite local-only and PIN-protection claims.

Tier 1 appears safest because it stays inside OpenClaw. For Tier 2 or Tier 3, assume dashboard data may be public, avoid sensitive task names or URLs, do not rely on a client-side PIN, and tighten Supabase/GitHub access controls before enabling the recurring updater.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may believe the dashboard data remains private when operational status, product URLs, task names, or action items may be publicly accessible.

Why it was flagged

The skill claims local-only and PIN-protected data, while the recommended GitHub Pages tier uses a public repository and publishes dashboard JSON data.

Skill content
All data stays on your machine. PIN-protected... gh repo create mission-control --public --clone ... Copy assets/templates/dashboard-data.json to data/
Recommendation

Do not rely on the client-side PIN as the only protection. Use private hosting or avoid putting sensitive operational details in the dashboard.

What this means

Anyone who obtains the public Supabase URL and anon key can read or overwrite the dashboard state, potentially falsifying status or action items.

Why it was flagged

The Supabase setup grants anonymous public read, update, and insert permissions on the dashboard_state table.

Skill content
CREATE POLICY "Allow public read" ... USING (true); ... CREATE POLICY "Allow public update" ... USING (true) WITH CHECK (true); ... CREATE POLICY "Allow public insert"
Recommendation

Restrict Supabase policies to authenticated users or a server-side update endpoint, and avoid granting anonymous write access unless the data is truly public and tamper-tolerant.

What this means

False or attacker-supplied dashboard data could mislead the user about active tasks, cron failures, product status, or urgent action items.

Why it was flagged

The dashboard stores persistent operational state in a shared table and explicitly allows anonymous updates, so the displayed state can be exposed or poisoned.

Skill content
data JSONB NOT NULL DEFAULT '{}'; ... The anon key can read and update ONLY this one table ... Worst case: someone overwrites your dashboard status
Recommendation

Treat dashboard content as public and untrusted unless access controls are tightened; validate or authenticate writers before using the dashboard for decisions.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

After setup, the updater may continue sharing operational status on a schedule without further prompts.

Why it was flagged

The skill asks the user to create a recurring background updater that collects agent status and pushes it to the configured dashboard destination.

Skill content
Create a cron job called "Dashboard Update" that runs every 30 minutes... Run `cron list`... Run `sessions_list`... Push to Supabase (or git push for Tier 2)
Recommendation

Enable the cron only if you want ongoing updates, document where it sends data, and disable it when the dashboard is no longer needed.