扫描报告
45 /100
gateway-monitor-installer
Install, update, run, and remove OpenClaw Gateway Monitor + Gateway Watchdog on macOS via LaunchAgent
Skill contains undeclared external network access and reads API credentials from auth profiles to transmit to minimaxi.com, with missing template files referenced in documentation.
谨慎使用
Add explicit declarations for external API calls to minimaxi.com, credential file access to ~/.openclaw/agents/main/agent/auth-profiles.json, and include the missing launchagent plist templates in the package.
安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Undeclared external network access 文档欺骗 | assets/bin/gateway-monitor-server.js:28 |
| 中危 | Undeclared credential file access 敏感访问 | assets/bin/gateway-monitor-server.js:309 |
| 中危 | Missing launchagent template files 文档欺骗 | SKILL.md:24 |
| 低危 | API key transmitted to external service 数据外泄 | assets/bin/gateway-monitor-server.js:344 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | READ | ✓ 一致 | SKILL.md declares file write to ~/.openclaw/tools/ |
| 网络访问 | NONE | READ | ✗ 越权 | gateway-monitor-server.js:28 - external HTTPS call to minimaxi.com not declared |
| 命令执行 | WRITE | WRITE | ✓ 一致 | launchctl commands in install.sh/status.sh are documented |
| 环境变量 | NONE | READ | ✗ 越权 | gateway-monitor-server.js:309 - reads MINIMAX_CP_KEY from environment |
3 项发现
中危 外部 URL 外部 URL
http://127.0.0.1:18990 SKILL.md:40 中危 外部 URL 外部 URL
https://www.minimaxi.com/v1/api/openplatform/coding_plan/remains assets/bin/gateway-monitor-server.js:28 中危 外部 URL 外部 URL
http://127.0.0.1:18990/api/summary scripts/status.sh:25 目录结构
6 文件 · 42.9 KB · 1527 行 JavaScript 1f · 1321L
Shell 4f · 159L
Markdown 1f · 47L
├─
▾
assets
│ └─
▾
bin
│ ├─
gateway-monitor-server.js
JavaScript
│ └─
gateway-watchdog.sh
Shell
├─
▾
scripts
│ ├─
install.sh
Shell
│ ├─
status.sh
Shell
│ └─
uninstall.sh
Shell
└─
SKILL.md
Markdown
安全亮点
✓ No reverse shell or C2 infrastructure detected
✓ No base64-encoded or obfuscated payloads found
✓ Uses standard macOS LaunchAgent for service management (legitimate)
✓ HTTPS used for external communication (not plaintext)
✓ No credential exfiltration to attacker-controlled infrastructure
✓ Configuration backup mechanism is sensible
✓ Error handling appears robust