Scan Report
45 /100
gateway-monitor-installer
Install, update, run, and remove OpenClaw Gateway Monitor + Gateway Watchdog on macOS via LaunchAgent
Skill contains undeclared external network access and reads API credentials from auth profiles to transmit to minimaxi.com, with missing template files referenced in documentation.
Use with caution
Add explicit declarations for external API calls to minimaxi.com, credential file access to ~/.openclaw/agents/main/agent/auth-profiles.json, and include the missing launchagent plist templates in the package.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Undeclared external network access Doc Mismatch | assets/bin/gateway-monitor-server.js:28 |
| Medium | Undeclared credential file access Sensitive Access | assets/bin/gateway-monitor-server.js:309 |
| Medium | Missing launchagent template files Doc Mismatch | SKILL.md:24 |
| Low | API key transmitted to external service Data Exfil | assets/bin/gateway-monitor-server.js:344 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | READ | ✓ Aligned | SKILL.md declares file write to ~/.openclaw/tools/ |
| Network | NONE | READ | ✗ Violation | gateway-monitor-server.js:28 - external HTTPS call to minimaxi.com not declared |
| Shell | WRITE | WRITE | ✓ Aligned | launchctl commands in install.sh/status.sh are documented |
| Environment | NONE | READ | ✗ Violation | gateway-monitor-server.js:309 - reads MINIMAX_CP_KEY from environment |
3 findings
Medium External URL 外部 URL
http://127.0.0.1:18990 SKILL.md:40 Medium External URL 外部 URL
https://www.minimaxi.com/v1/api/openplatform/coding_plan/remains assets/bin/gateway-monitor-server.js:28 Medium External URL 外部 URL
http://127.0.0.1:18990/api/summary scripts/status.sh:25 File Tree
6 files · 42.9 KB · 1527 lines JavaScript 1f · 1321L
Shell 4f · 159L
Markdown 1f · 47L
├─
▾
assets
│ └─
▾
bin
│ ├─
gateway-monitor-server.js
JavaScript
│ └─
gateway-watchdog.sh
Shell
├─
▾
scripts
│ ├─
install.sh
Shell
│ ├─
status.sh
Shell
│ └─
uninstall.sh
Shell
└─
SKILL.md
Markdown
Security Positives
✓ No reverse shell or C2 infrastructure detected
✓ No base64-encoded or obfuscated payloads found
✓ Uses standard macOS LaunchAgent for service management (legitimate)
✓ HTTPS used for external communication (not plaintext)
✓ No credential exfiltration to attacker-controlled infrastructure
✓ Configuration backup mechanism is sensible
✓ Error handling appears robust