Scan Report
5 /100
opencron
Visual cron job dashboard for OpenClaw — live countdown timers, run history, calendar view
OpenCron is a legitimate visual cron job dashboard for OpenClaw with no malicious behavior detected.
Safe to install
This skill is safe to use. No security concerns were identified.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | git clone not explicitly declared | bin/install.js:21 |
| Info | External network fetch from raw GitHubusercontent | update_canvas.py:17 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | generate.py:28 reads ~/.openclaw/cron/jobs.json |
| Filesystem | WRITE | WRITE | ✓ Aligned | update_canvas.py:24 writes CANVAS_HTML.write_bytes(req.read()) |
| Network | READ | READ | ✓ Aligned | update_canvas.py:22 urllib.request.urlopen(DASHBOARD_URL) |
| Shell | WRITE | WRITE | ✓ Aligned | watch_sync.sh:9 cp and sleep loop; serve.py:42 HTTPServer |
| Environment | NONE | READ | ✓ Aligned | SKILL.md references ${OPENCLAW_GATEWAY_TOKEN} and ${CANVAS_PORT} but does not de… |
3 findings
Medium External URL 外部 URL
http://www.w3.org/2000/svg demo.html:276 Medium External URL 外部 URL
http://0.0.0.0: serve.py:60 Info Email 邮箱地址
[email protected] demo.html:345 File Tree
9 files · 60.9 KB · 1250 lines HTML 1f · 799L
Markdown 2f · 222L
Python 3f · 149L
JavaScript 1f · 60L
JSON 1f · 11L
Shell 1f · 9L
├─
▾
bin
│ └─
install.js
JavaScript
├─
demo.html
HTML
├─
generate.py
Python
├─
package.json
JSON
├─
README.md
Markdown
├─
serve.py
Python
├─
SKILL.md
Markdown
├─
update_canvas.py
Python
└─
watch_sync.sh
Shell
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
None (Python stdlib only) | N/A | stdlib | No | No pip packages required |
node (child_process, fs, path) | N/A | Node.js stdlib | No | Standard Node.js built-in modules only |
Security Positives
✓ No credential harvesting — OPENCLAW_GATEWAY_TOKEN is used only for URL construction, never exfiltrated
✓ No subprocess/eval with user-controlled input
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No base64 encoding or obfuscation
✓ No data exfiltration to external IPs
✓ No reverse shell or C2 infrastructure
✓ demo.html contains only mock data, no hidden instructions
✓ Python scripts use only standard library (no external dependencies)
✓ File operations are scoped to the .openclaw canvas directory