ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      luccast

      Safety Report

      Crabwalk

      @luccast

      Real-time companion monitor for OpenClaw agents

      2,136Downloads
      11Installs
      3Stars
      2Versions
      Monitoring & Logging1,579Legal & Compliance738

      Security Analysis

      high confidence
      Suspicious0.08 risk

      The skill's instructions match a monitoring tool but the package omits declaring that it reads local OpenClaw config/auth and it instructs downloading and running a network-exposed binary — these mismatches and exposure risks warrant caution.

      Feb 11, 20261 files5 concerns
      Purpose & Capabilitynote

      The SKILL.md describes a real-time monitor and the commands (download GitHub release, run a server, connect to OpenClaw gateway) are coherent with that purpose. However the registry metadata claimed no required config paths or credentials while the runtime instructions explicitly auto-detect a gateway auth token from ~/.openclaw/openclaw.json and provide a --token CLI flag. That discrepancy (metadata not declaring access to local OpenClaw config/auth) is unexpected.

      Instruction Scopeconcern

      The instructions tell the user/agent to download and extract a release archive, install a binary, modify shell rc files to add to PATH, optionally run package managers with sudo, and start a server bound to 0.0.0.0 that serves agent activity over the network. The skill will read the OpenClaw config to auto-detect tokens and may expose agent activity via a network-accessible monitor — this is broader and higher-risk behavior than a purely read-only helper and should be explicitly declared and consented to.

      Install Mechanismnote

      Install uses GitHub releases (curl to GitHub releases URL piped to tar -xz and extracted under ~/.crabwalk then copied to ~/.local/bin). Using GitHub releases is a reasonable distribution mechanism, but the script extracts a remote archive to the user's home and places a binary on disk — this is more invasive than an instruction-only skill with no install steps and should be treated as executing third-party code.

      Credentialsconcern

      The registry lists no required env vars or config paths, yet the CLI and docs state the tool auto-detects a gateway token from ~/.openclaw/openclaw.json and accepts a --token flag. That means the skill will access local credential material even though the manifest doesn't declare it. Requesting/using local gateway auth tokens is proportional to a monitor, but the lack of declaration is an inconsistency and a privacy/credential-exposure concern.

      Persistence & Privilegeconcern

      The skill is not marked always:true, but disableModelInvocation is not set, so the model could invoke the skill (or follow its instructions) autonomously. Because the instructions install and run a server that can be bound to all interfaces and read local gateway tokens, allowing autonomous invocation without explicit declaration increases risk of unintended installation or exposure. The install also suggests using sudo for system package installation (qrencode), which elevates privilege if followed.

      Guidance

      This skill appears to be a legitimate agent monitor, but exercise caution before installing: - Confirm the upstream source: inspect the GitHub repository (https://github.com/luccast/crabwalk) and review the release contents and source code before running the install script. - Expect the tool to read your OpenClaw config (~/.openclaw/openclaw.json) to auto-detect a gateway token — treat that as a credential and verify how it's used/stored. - The install extracts and places a binary under ~/.crabwalk and ~/.local/bin; only run this if you trust the release. Consider running inside an isolated VM/container first. - The server binds to 0.0.0.0 by default and the instructions encourage sharing a LAN-accessible link — ensure you understand who can reach that port and do not expose it to the public internet. - The install may call system package managers with sudo (optional); avoid running commands with elevated privileges unless necessary. - If you want to proceed: verify the binary signature (if provided), audit the repository, or build from source; otherwise decline or run in an isolated environment. Because the manifest omitted declaration of local config/credential access while the instructions use it and because the install actively fetches and executes a release archive, I classify this as suspicious rather than benign.

      Latest Release

      v0.1.2

      - Added a new step guiding users to request feedback from humans after some usage. - Introduced instructions for capturing and submitting user-reported issues as feedback. - Provided links to submit and view feedback directly within the documentation. - No changes to CLI or server functionality; documentation improvements only.

      More by @luccast

      gogcli - Google Workspace CLI

      5 stars

      Crabwalk

      2 stars

      self-improving-agent

      @pskoett · 1,456 stars

      Gog

      @steipete · 672 stars

      Tavily Web Search

      @arun-8687 · 620 stars

      Find Skills

      @JimLiuxinghai · 529 stars

      Published by @luccast on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]