扫描报告
12 /100
gateway-monitor-macos
Install and operate a local OpenClaw Gateway Monitor stack on macOS with LaunchAgent + watchdog
This is a legitimate local macOS monitoring dashboard for OpenClaw Gateway with no malicious behavior. All network requests are outbound HTTPS to known APIs, credential access is limited to the local OpenClaw auth store for usage monitoring, and shell execution is documented and relevant to the monitoring functionality.
可以安装
This skill is safe to use. The main concern is the local HTTP server on port 18990 being accessible to other local processes - ensure the machine is not shared or exposed.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Local HTTP server without authentication 敏感访问 | assets/gateway-monitor/server.js:1 |
| 低危 | SKILL.md does not mention network:READ capability 文档欺骗 | SKILL.md:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | install.sh:45-89 writes plists, rsync copies files to ~/.openclaw/ |
| 命令执行 | WRITE | WRITE | ✓ 一致 | install.sh runs launchctl, rsync, chmod; server.js:297 execSync for gateway stat… |
| 网络访问 | READ | READ | ✓ 一致 | server.js:29-32 makes outbound HTTPS calls to minimaxi.com and GitHub API |
| 环境变量 | NONE | READ | ✓ 一致 | server.js:318 reads MINIMAX_CP_KEY from env - documented purpose for API auth |
| 技能调用 | NONE | INVOKE | ✓ 一致 | This is the skill itself |
4 项发现
中危 外部 URL 外部 URL
https://www.minimaxi.com/v1/api/openplatform/coding_plan/remains assets/gateway-monitor/server.js:29 中危 外部 URL 外部 URL
http://127.0.0.1:9981/v1/models assets/gateway-monitor/server.js:32 中危 外部 URL 外部 URL
http://127.0.0.1:9981 assets/gateway-monitor/server.js:154 中危 外部 URL 外部 URL
http://www.apple.com/DTDs/PropertyList-1.0.dtd scripts/install.sh:44 目录结构
8 文件 · 127.9 KB · 3870 行 JavaScript 1f · 1974L
HTML 1f · 1642L
Shell 4f · 186L
Markdown 2f · 68L
├─
▾
assets
│ └─
▾
gateway-monitor
│ ├─
▾
public
│ │ └─
index.html
HTML
│ ├─
gateway-watchdog.sh
Shell
│ └─
server.js
JavaScript
├─
▾
scripts
│ ├─
install.sh
Shell
│ ├─
status.sh
Shell
│ └─
uninstall.sh
Shell
├─
README.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ No base64-encoded payloads or obfuscated code found
✓ No reverse shell, C2, or data exfiltration to external IPs
✓ MiniMax API key is read from local OpenClaw auth store and only used to query usage - not exfiltrated
✓ All external network calls are outbound HTTPS to legitimate APIs (MiniMax, GitHub, local OMLX)
✓ File operations are scoped to ~/.openclaw/ directory only
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or system credentials
✓ LaunchAgent persistence is explicitly declared and relevant to the skill's purpose
✓ execSync usage is limited to reading gateway status via CLI tools - documented and necessary
✓ No curl|bash or wget|sh remote script execution patterns
✓ No prompt injection, supply chain risks, or credential harvesting for external theft