Gateway Monitor Installer
Analysis
The installer mostly matches its monitoring purpose, but it deserves review because the bundled background service reads local MiniMax/OpenClaw auth credentials and defines external provider access while installing persistent LaunchAgents.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
launchctl bootstrap "gui/$(id -u)" "$plist"; launchctl enable "$target"; launchctl kickstart -k "$target"
The installer creates and starts user LaunchAgents so the monitor and watchdog continue running in the background. This matches the stated purpose, but it is persistent behavior.
const OPENCLAW_STATUS_CMD = process.env.OPENCLAW_STATUS_CMD || '/opt/homebrew/opt/node/bin/node /opt/homebrew/lib/node_modules/openclaw/dist/index.js gateway status --json'; ... return execSync(command, { encoding: 'utf8', timeout, stdio: ['ignore', 'pipe', 'ignore'] })The monitor runs local shell commands to collect gateway status. That is purpose-aligned, but the command strings are broad and environment-overridable.
TPL_MONITOR="$ROOT_DIR/assets/launchagents/${MONITOR_LABEL}.plist.tpl" ... TPL_WATCHDOG="$ROOT_DIR/assets/launchagents/${WATCHDOG_LABEL}.plist.tpl"The installer depends on LaunchAgent template files that are not present in the supplied file manifest, leaving package completeness and the exact launch configuration unclear.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const MINIMAX_AUTH_PROFILE_PATH = path.join(HOME, '.openclaw/agents/main/agent/auth-profiles.json'); ... const envKey = String(process.env.MINIMAX_CP_KEY || '').trim(); ... data?.profiles?.['minimax-portal:default']?.access
The background monitor can obtain a MiniMax/OpenClaw access token from an environment variable or the user's local auth profile, while the registry declares no credentials and SKILL.md does not disclose credential use.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
const MINIMAX_REMAINS_URL = process.env.MINIMAX_REMAINS_URL || 'https://www.minimaxi.com/v1/api/openplatform/coding_plan/remains'; ... https.request({ ... headers, timeout: timeoutMs })The monitor includes an external MiniMax provider endpoint and an HTTPS helper that can send request headers, but the SKILL.md runbook does not explain this provider communication or its data boundary.
