Gateway Monitor
Analysis
The skill is mostly consistent with a gateway monitoring dashboard, but it asks users to run external code not included in the package and exposes high-impact restore/restart/service-control actions.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
git clone https://github.com/yes999zc/gateway-monitor.git cd gateway-monitor # 无需依赖,直接运行 node server.js
The packaged skill contains no server.js or install spec, yet the instructions direct the user to clone and run external Node.js code. Because that external code would power service control and config-restore functions, the provenance gap is material.
GET /api/restore-config?confirm=true - 恢复配置 GET /api/gateway-restart?confirm=true - 重启 Gateway GET /api/litellm-control?action=wake|start|stop|restart&confirm=true - 控制 LiteLLM 容器
The documented API includes state-changing restore, restart, and container control operations exposed as GET endpoints with confirmation represented by a URL parameter. These actions are high-impact and the artifacts do not show stronger authorization or scoping.
cp bin/ai.openclaw.gateway-monitor.plist ~/Library/LaunchAgents/ launchctl load ~/Library/LaunchAgents/ai.openclaw.gateway-monitor.plist # 手动后台运行 nohup node server.js > gateway-monitor.log 2>&1 &
The skill documents launchd and nohup background operation. This is coherent for a monitoring dashboard, but it creates persistent local behavior users should knowingly enable.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
export OMLX_API_KEY=8888 # oMLX API 密钥
The skill documents an optional API key for oMLX access, while registry metadata declares no credentials. This appears purpose-aligned, but it is sensitive authority users should notice.
