ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      luccast

      Safety Report

      Crabwalk

      @luccast

      Real-time companion monitor for OpenClaw agents

      1,494Downloads
      11Installs
      2Stars
      1Versions
      Monitoring & Logging1,579Legal & Compliance738

      Security Analysis

      medium confidence
      Suspicious0.12 risk

      The skill's instructions mostly match a monitoring tool, but there are notable mismatches and potentially risky install/runtime behaviors (downloading & executing a release archive, auto-reading an OpenClaw config token, modifying shell rc files, and binding to 0.0.0.0) that are not fully declared in the metadata.

      Feb 11, 20261 files5 concerns
      Purpose & Capabilitynote

      The declared purpose — a real-time monitor for OpenClaw agents — aligns with the instructions (install a Crabwalk binary and connect to the local OpenClaw gateway). However the SKILL.md references reading the OpenClaw config (~/.openclaw/openclaw.json) to auto-detect a gateway token, but the registry metadata did not declare any required config paths or credentials; that mismatch should have been declared.

      Instruction Scopeconcern

      The runtime instructions explicitly tell the agent/user to download and extract a release tarball from GitHub, copy a binary into ~/.local/bin, append PATH changes to shell rc files, optionally install system packages using sudo, and start a server bound to 0.0.0.0. The instructions also auto-detect an auth token from ~/.openclaw/openclaw.json. These actions go beyond a purely read-only monitor (they write binaries to disk, change shell startup files, may invoke elevated package installs, and expose a service to the network). Reading the OpenClaw config is consistent with the tool's purpose but should have been declared.

      Install Mechanismnote

      Install is via a GitHub Releases tarball (well-known host) and standard extraction to ~/.crabwalk, then copying the binary to ~/.local/bin. Using GitHub releases is common/expected, but extracting and executing an archive obtained at runtime writes arbitrary code to disk — acceptable for a CLI tool but inherently higher-risk than instruction-only skills. The script also attempts to install qrencode with package managers using sudo, which may prompt for elevation.

      Credentialsconcern

      The skill declares no required env vars or config paths, yet the CLI/README states it will auto-detect a gateway auth token from ~/.openclaw/openclaw.json. Access to that token is proportional to the stated purpose, but the omission in metadata is an inconsistency. No unrelated third-party credentials are requested.

      Persistence & Privilegenote

      The skill does not request always:true and allows user invocation. However the installer writes files to ~/.crabwalk and ~/.local/bin and appends PATH entries to ~/.bashrc/.zshrc, giving it persistent presence in the user environment. The server binds to 0.0.0.0 by default (0.0.0.0:3000), which exposes the monitor to the local network — expected for remote human access but increases attack surface and privacy risk.

      Guidance

      What to consider before installing: - Metadata mismatch: The skill did not declare that it reads the OpenClaw config (~/.openclaw/openclaw.json) but the instructions say it will auto-detect the gateway token there. Confirm that reading that file is acceptable for your environment. - Binary install from GitHub: The install downloads and extracts a release tarball and places a binary in ~/.local/bin. Although GitHub releases are common, this will execute code on your machine. Verify the project's repo (https://github.com/luccast/crabwalk), review the source or release artifacts, and confirm the release checksum/signature if available. - Persistence and shell modification: The installer appends PATH export lines to your shell rc files. Expect files under ~/.crabwalk and an executable in ~/.local/bin; be prepared to remove them if you uninstall. - Network exposure: Crabwalk defaults to binding 0.0.0.0:3000 and instructs sharing the network IP. That makes the monitor accessible from other machines on your network — fine if intentional, risky if running on a public or untrusted network. Consider firewall rules or binding to localhost with an SSH tunnel if you want restricted access. - Elevated installs: The script optionally uses package managers with sudo to install qrencode. Expect sudo prompts; the rest of the install does not require root. - Safer steps: run the tool in an isolated VM/container or on a non-sensitive host first; inspect the GitHub repository and release artifacts; prefer source builds if possible; backup relevant files and review ~/.bashrc/.zshrc changes after installation. If the author provided explicit metadata (required config path, checksums for releases, or a signed release), my confidence that this is coherent would increase. Without those, treat the skill as plausible but with installation/runtime actions that deserve manual review.

      Latest Release

      v0.1.0

      - Initial release of Crabwalk public skill. - Provides installation, verification, and start instructions to run the Crabwalk real-time OpenClaw agent monitor. - Includes CLI commands and options for starting, updating, and managing the monitor server. - Lists key features: real-time activity graph, file browser, markdown viewer, and auto gateway token detection. - Documents requirements, update process, and troubleshooting steps.

      More by @luccast

      gogcli - Google Workspace CLI

      5 stars

      Crabwalk

      3 stars

      self-improving-agent

      @pskoett · 1,456 stars

      Gog

      @steipete · 672 stars

      Tavily Web Search

      @arun-8687 · 620 stars

      Find Skills

      @JimLiuxinghai · 529 stars

      Published by @luccast on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]