Set up JARVIS Mission Control v2.0.4 — a free, open-source AI agent coordination hub. Kanban board, real-time WebSocket updates, team chat, scheduled job vis...
Security Analysis
medium confidenceThe skill mostly matches its stated purpose (self-hosted mission control) but its runtime instructions claim automatic discovery and reading of agent/session files (including ~/.claude sessions and OpenClaw agent cron/jobs) and reference cloud sync scripts — behaviors that access sensitive local data and external endpoints without clear, declared consent.
Name/description (agent coordination hub) aligns with cloning a repo, starting a Node server, and exposing dashboards. Requiring node/npm/git is proportionate. However the README/SKILL.md describe automatic discovery of other agents, reading agent SOUL/MEMORY/IDENTITY files, parsing ~/.claude/projects/ sessions (including tokens/cost), and optionally syncing local .mission-control to missiondeck.ai — some of these data accesses go beyond a minimal 'dashboard' and imply reading sensitive files or network discovery.
Runtime instructions instruct the agent/user to clone and run init/connect scripts and start the server. They also describe auto-discovery of OpenClaw agents and polling ~/.claude/projects/ every 60s to show session tokens/cost/model, auto-reading/writing of SOUL.md / MEMORY.md / IDENTITY.md, and exposing cron job info across agents. Those are explicit file and telemetry accesses not scoped in the top-level requirements and could reveal secrets or private activity. The SKILL.md also encourages running connect-missiondeck.sh with an API key for cloud sync — that step could transmit local data to an external service.
Instruction-only skill: no install spec and no files executed by the skill engine itself. The suggested workflow clones a public GitHub repo and runs included scripts (init/connect/start). From a platform perspective this is lower-risk than arbitrary downloads, but the actual behavior depends on the contents of those scripts (not included here).
Registry metadata lists no required credentials and only optional envs (PORT, MISSION_CONTROL_DIR, OPENCLAW_CRON_FILE). Yet the instructions state the system auto-discovers and parses ~/.claude sessions and reads OpenClaw cron jobs and agent files. Accessing ~/.claude (containing tokens) or other agents' cron/jobs and SOUL/MEMORY files are sensitive actions not reflected in the declared required envs/config paths or in an explicit consent step. The README also prompts users to provide a MissionDeck API key for cloud sync, which would grant an external service access to local data — the skill asks for that in user docs but does not mark such credentials as required.
The skill does not request 'always: true' or modify other skills. It instructs the user to run a long-running server which will create a .mission-control directory (expected). The primary risk is the combination of persistent local storage plus optional cloud sync (connect-missiondeck.sh) and automatic discovery/polling (which increases data-exposure persistence). Autonomous invocation is the platform default and not a distinguishing risk here.
Guidance
This repo looks like a legitimate self-hosted dashboard, but it also describes automatic discovery and reading of agent/session files (e.g., ~/.claude/projects, OpenClaw cron/jobs, SOUL/MEMORY/IDENTITY), and it documents an optional cloud-sync flow to missiondeck.ai that requires an API key. Before installing or running anything: 1) Inspect the contents of ./scripts/init-mission-control.sh and ./scripts/connect-missiondeck.sh (and any server startup scripts) — look for network calls, file uploads, or commands that read home-directory files. 2) Confirm what paths the server reads/writes (does it actually read ~/.claude and what fields?). 3) If you want to avoid exfiltration, do not run the connect-missiondeck.sh script or provide an API key; run locally in an isolated/test environment first. 4) Check whether the dashboard exposes or transmits agent tokens/credentials and whether you can opt out of any auto-discovery. If you can share the init/connect script contents or server code, I can re-evaluate with higher confidence.
Latest Release
v2.0.4
- Added a live demo link to missiondeck.ai (no account required) in the README. - Clarified that all data is stored as JSON files, removing the specific SQLite reliability note from Data Storage. - No changes to core features, UI, or CLI functionality.
More by @Asif2BD
Published by @Asif2BD on ClawHub