Agent Status Monitor
Analysis
The core monitor is mostly read-only, but the included Telegram command can expose local agent status from broad chat scopes without clear access controls.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
const result = execSync(SCRIPT_PATH, {
encoding: 'utf-8',
timeout: 30000,
env: { ...process.env, FORCE_COLOR: '0' }The Telegram handler executes a local shell script. The command path is fixed and no user-controlled arguments are passed, so this is purpose-aligned but still important for users to notice.
config.commands.aliases['agents_monitor'] = {
type: 'exec',
command: '~/.openclaw/workspace/skills/agent-status-monitor/scripts/check-agents.sh',
description: '检查本地开发 Agent 运行状态',
streaming: false
};If run, the installer persistently adds an exec alias to the user's OpenClaw configuration.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
"command": "agents_monitor",
"description": "检查本地开发 Agent(Claude Code、OpenCode 等)的运行状态",
"scope": "all"The Telegram command is configured for all scopes, but the artifacts do not show an enforced private-chat or authorized-user boundary for returning local agent status.
cat ~/.local/state/opencode/prompt-history.jsonl
A reference command would display OpenCode prompt history, which may contain private conversation or task context. The included status scripts do not run this command.
