ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      Asif2BD

      Safety Report

      JARVIS Mission Control — Free AI Agent Coordination Hub

      @Asif2BD

      Set up JARVIS Mission Control v2.0.4 — a free, open-source AI agent coordination hub. Kanban board, real-time WebSocket updates, team chat, scheduled job vis...

      785Downloads
      5Installs
      4Stars
      11Versions
      Workflow Automation3,323Customer Support1,744Project Management1,537Calendar & Scheduling1,462

      Security Analysis

      medium confidence
      Suspicious0.08 risk

      The skill mostly matches its stated purpose (self-hosted mission control) but its runtime instructions claim automatic discovery and reading of agent/session files (including ~/.claude sessions and OpenClaw agent cron/jobs) and reference cloud sync scripts — behaviors that access sensitive local data and external endpoints without clear, declared consent.

      Mar 4, 20263 files4 concerns
      Purpose & Capabilitynote

      Name/description (agent coordination hub) aligns with cloning a repo, starting a Node server, and exposing dashboards. Requiring node/npm/git is proportionate. However the README/SKILL.md describe automatic discovery of other agents, reading agent SOUL/MEMORY/IDENTITY files, parsing ~/.claude/projects/ sessions (including tokens/cost), and optionally syncing local .mission-control to missiondeck.ai — some of these data accesses go beyond a minimal 'dashboard' and imply reading sensitive files or network discovery.

      Instruction Scopeconcern

      Runtime instructions instruct the agent/user to clone and run init/connect scripts and start the server. They also describe auto-discovery of OpenClaw agents and polling ~/.claude/projects/ every 60s to show session tokens/cost/model, auto-reading/writing of SOUL.md / MEMORY.md / IDENTITY.md, and exposing cron job info across agents. Those are explicit file and telemetry accesses not scoped in the top-level requirements and could reveal secrets or private activity. The SKILL.md also encourages running connect-missiondeck.sh with an API key for cloud sync — that step could transmit local data to an external service.

      Install Mechanismok

      Instruction-only skill: no install spec and no files executed by the skill engine itself. The suggested workflow clones a public GitHub repo and runs included scripts (init/connect/start). From a platform perspective this is lower-risk than arbitrary downloads, but the actual behavior depends on the contents of those scripts (not included here).

      Credentialsconcern

      Registry metadata lists no required credentials and only optional envs (PORT, MISSION_CONTROL_DIR, OPENCLAW_CRON_FILE). Yet the instructions state the system auto-discovers and parses ~/.claude sessions and reads OpenClaw cron jobs and agent files. Accessing ~/.claude (containing tokens) or other agents' cron/jobs and SOUL/MEMORY files are sensitive actions not reflected in the declared required envs/config paths or in an explicit consent step. The README also prompts users to provide a MissionDeck API key for cloud sync, which would grant an external service access to local data — the skill asks for that in user docs but does not mark such credentials as required.

      Persistence & Privilegenote

      The skill does not request 'always: true' or modify other skills. It instructs the user to run a long-running server which will create a .mission-control directory (expected). The primary risk is the combination of persistent local storage plus optional cloud sync (connect-missiondeck.sh) and automatic discovery/polling (which increases data-exposure persistence). Autonomous invocation is the platform default and not a distinguishing risk here.

      Guidance

      This repo looks like a legitimate self-hosted dashboard, but it also describes automatic discovery and reading of agent/session files (e.g., ~/.claude/projects, OpenClaw cron/jobs, SOUL/MEMORY/IDENTITY), and it documents an optional cloud-sync flow to missiondeck.ai that requires an API key. Before installing or running anything: 1) Inspect the contents of ./scripts/init-mission-control.sh and ./scripts/connect-missiondeck.sh (and any server startup scripts) — look for network calls, file uploads, or commands that read home-directory files. 2) Confirm what paths the server reads/writes (does it actually read ~/.claude and what fields?). 3) If you want to avoid exfiltration, do not run the connect-missiondeck.sh script or provide an API key; run locally in an isolated/test environment first. 4) Check whether the dashboard exposes or transmits agent tokens/credentials and whether you can opt out of any auto-discovery. If you can share the init/connect script contents or server code, I can re-evaluate with higher confidence.

      Latest Release

      v2.0.4

      - Added a live demo link to missiondeck.ai (no account required) in the README. - Clarified that all data is stored as JSON files, removing the specific SQLite reliability note from Data Storage. - No changes to core features, UI, or CLI functionality.

      More by @Asif2BD

      OpenClaw Token Optimizer

      8 stars

      Claude Code CLI for OpenClaw

      0 stars

      Avenger Initiative

      0 stars

      Humanize AI Content

      0 stars

      VoiceClaw

      0 stars

      OpenClaw Skill Lazy Loader

      0 stars

      Published by @Asif2BD on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]