Install
openclaw skills install security-dashboardReal-time security monitoring dashboard for OpenClaw and Linux server infrastructure. Monitors gateway status, network security, public exposure, system updates, SSH access, TLS certificates, and resource usage.
openclaw skills install security-dashboardReal-time security monitoring dashboard for OpenClaw and Linux server infrastructure.
cd /root/clawd/skills/security-dashboard
sudo ./scripts/install.sh
This will:
openclaw-dashboard user with limited sudo privileges (if non-root)Security Note: Running as a dedicated user with limited sudo is recommended. The dashboard only needs sudo for security checks (fail2ban, firewall, systemctl status) - not full root access.
Localhost only (secure by default):
Via SSH port forwarding:
ssh -L 18791:localhost:18791 root@YOUR_SERVER_IP
Then visit: http://localhost:18791
sudo systemctl start security-dashboard
sudo systemctl stop security-dashboard
sudo systemctl restart security-dashboard
sudo systemctl status security-dashboard
sudo journalctl -u security-dashboard -f
Get raw security metrics:
curl http://localhost:18791/api/security | jq
The dashboard follows security best practices to minimize attack surface:
The install script creates a openclaw-dashboard user with limited sudo privileges:
/bin/false)Service runs with security restrictions:
NoNewPrivileges=true # Cannot escalate privileges
PrivateTmp=true # Isolated tmp directory
ProtectSystem=strict # Read-only filesystem except skill dir
ProtectHome=true # No access to /home
ReadWritePaths=... # Only skill directory is writable
Restart=on-failure # Restart only on crashes (not always)
127.0.0.1 (localhost only)If you choose root during install:
Use the dedicated user option for production deployments.
Edit /root/clawd/skills/security-dashboard/server.js:
const PORT = 18791; // Change this
Then restart:
sudo systemctl restart security-dashboard
Default: 127.0.0.1 (localhost only - secure)
Alternative: 0.0.0.0 (all interfaces - only with Tailscale!)
Edit server.js line 445:
server.listen(PORT, '127.0.0.1', () => {
// Change '127.0.0.1' to '0.0.0.0' if needed
});
⚠️ Security Warning: Only bind to 0.0.0.0 if behind Tailscale or firewall!
Add custom checks in server.js:
getOpenClawMetrics() - OpenClaw-specific metricsgetNetworkMetrics() - Network securitygetSystemMetrics() - System-level checksgetPublicExposure() - Port/binding analysisDashboard generates real-time alerts:
Critical (Red):
Warning (Yellow):
Info (Blue):
Add security status to morning report:
curl -s http://localhost:18791/api/security | jq '.status'
Monitor for critical alerts:
curl -s http://localhost:18791/api/security | \
jq '.alerts[] | select(.level == "critical")'
Pipe alerts to notification systems:
./scripts/check-alerts.sh | xargs -I {} notify-send "Security Alert" "{}"
Backend: Node.js HTTP server
Frontend: Vanilla JavaScript (no frameworks)
Port: 18791 (configurable)
Binding: 127.0.0.1 (localhost only)
Service: systemd unit
Files:
server.js - Main backend (metrics collection + API)public/index.html - Dashboard UIlib/ - Shared utilities (if needed)systemctl - Service managementss - Socket statisticsufw or firewalld - Firewall checktailscale - VPN status (optional)fail2ban - Ban tracking (optional)openclaw - Gateway monitoringAll dependencies are standard Linux utilities except OpenClaw.
Check service status:
sudo systemctl status security-dashboard
Check logs:
sudo journalctl -u security-dashboard -n 50
Verify port is listening:
ss -tlnp | grep 18791
Test API directly:
curl http://localhost:18791/api/security
Verify OpenClaw gateway is running:
pgrep -f openclaw-gateway
Check OpenClaw config exists:
cat ~/.openclaw/openclaw.json
sudo systemctl stop security-dashboard
sudo systemctl disable security-dashboard
sudo rm /etc/systemd/system/security-dashboard.service
sudo systemctl daemon-reload
Then remove skill directory:
rm -rf /root/clawd/skills/security-dashboard
To publish to ClawdHub:
clawdhub publish security-dashboard
MIT
Created by Erdma for Brian Christner's infrastructure monitoring.