Reverse proxy from internet to open claw

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its stated purpose, but it opens a persistent public OpenClaw API, encourages sharing a bearer-token credential, and runs unpinned setup code from the internet.

Install only if you intentionally want your OpenClaw API reachable from the public internet. Review the script first, preinstall dependencies if possible, keep the token private, share it only with trusted people, and run the disconnect script when you no longer need external access.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone who receives or obtains the token can use the user's public OpenClaw API; the artifacts do not define per-user scopes, expiration, rate limits, or limited permissions.

Why it was flagged

The credential file contains the public URL and bearer token, and the README explicitly encourages sharing it to grant API access.

Skill content
"Your credentials are saved to `~/.openclaw/ecto-credentials.json`" ... "Share this file with anyone you want to give API access to your OpenClaw instance."
Recommendation

Only share credentials with highly trusted recipients. Prefer per-recipient tokens, expiration, rate limits, clear revocation steps, and explicit warnings about what remote API users can do.

What this means

Running the setup can execute changing third-party installation code on the user's machine before the proxy is configured.

Why it was flagged

If Homebrew is missing, the setup script downloads and runs the current HEAD version of a remote installer at runtime, without pinning or verification.

Skill content
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
Recommendation

Preinstall dependencies through trusted channels, pin or verify installer versions, and prompt the user before running remote installation scripts.

What this means

Installing or running the skill can interrupt an existing gateway and change how OpenClaw is exposed and authenticated.

Why it was flagged

The setup directly changes OpenClaw gateway configuration, enables API endpoints, writes the auth password, and forcibly restarts existing gateway processes.

Skill content
openclaw config set gateway.auth.password "$AUTH_TOKEN" ... jq --arg password "$AUTH_TOKEN" '.gateway.bind = "loopback" | ... .gateway.http.endpoints.responses.enabled = true ...' ... pkill -9 -f "openclaw.*gateway"
Recommendation

Review the config changes before running, keep the generated backup, and run the script only when ready to restart the gateway.

What this means

OpenClaw may remain reachable from the internet after setup until the user runs the disconnect command or otherwise disables the funnel.

Why it was flagged

The script starts both the Tailscale Funnel and OpenClaw gateway as background services, which is expected for this skill but creates persistent access.

Skill content
sudo tailscale funnel --bg $GATEWAY_PORT ... nohup openclaw gateway run --port $GATEWAY_PORT --force > "$GATEWAY_LOG" 2>&1 &
Recommendation

Use the status and disconnect scripts to verify exposure, revoke/regenerate tokens when sharing changes, and disable the funnel when external access is no longer needed.