โ† All skills
Tencent SkillHub ยท Other

Security Dashboard

Real-time security monitoring dashboard for OpenClaw and Linux server infrastructure. Monitors gateway status, network security, public exposure, system updates, SSH access, TLS certificates, and resource usage.

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Real-time security monitoring dashboard for OpenClaw and Linux server infrastructure. Monitors gateway status, network security, public exposure, system updates, SSH access, TLS certificates, and resource usage.

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
README.md, SKILL.md, public/index.html, scripts/check-security.sh, scripts/install.sh, scripts/publish.sh

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.2.1

Documentation

ClawHub primary doc Primary doc: SKILL.md 36 sections Open source page

Security Dashboard Skill

Real-time security monitoring dashboard for OpenClaw and Linux server infrastructure.

Features

OpenClaw Security: Gateway status, binding, authentication, sessions, version tracking Network Security: Tailscale status, public ports, firewall, active connections Public Exposure: Port binding analysis, dashboard security, exposure level assessment System Security: Updates, uptime, load, failed login attempts SSH & Access: Password auth status, fail2ban, banned IPs, active sessions Certificates & TLS: Caddy status, TLS configuration, WireGuard encryption Resource Security: CPU/memory/disk usage, config file permissions

1. Install the Skill

cd /root/clawd/skills/security-dashboard sudo ./scripts/install.sh This will: Ask user preference: Run as dedicated user (recommended) or root Create openclaw-dashboard user with limited sudo privileges (if non-root) Create systemd service with security hardening Configure localhost binding (127.0.0.1 only) Start the dashboard on port 18791 Enable auto-start on boot Security Note: Running as a dedicated user with limited sudo is recommended. The dashboard only needs sudo for security checks (fail2ban, firewall, systemctl status) - not full root access.

2. Access the Dashboard

Localhost only (secure by default): Via SSH port forwarding: ssh -L 18791:localhost:18791 root@YOUR_SERVER_IP Then visit: http://localhost:18791

Start/Stop/Restart

sudo systemctl start security-dashboard sudo systemctl stop security-dashboard sudo systemctl restart security-dashboard

Check Status

sudo systemctl status security-dashboard

View Logs

sudo journalctl -u security-dashboard -f

API Endpoint

Get raw security metrics: curl http://localhost:18791/api/security | jq

Security Hardening

The dashboard follows security best practices to minimize attack surface:

Dedicated User (Recommended)

The install script creates a openclaw-dashboard user with limited sudo privileges: โœ… No shell access (/bin/false) โœ… No home directory โœ… Only specific sudo commands allowed (fail2ban, firewall, systemctl status) โœ… Cannot execute arbitrary commands

Systemd Hardening

Service runs with security restrictions: NoNewPrivileges=true # Cannot escalate privileges PrivateTmp=true # Isolated tmp directory ProtectSystem=strict # Read-only filesystem except skill dir ProtectHome=true # No access to /home ReadWritePaths=... # Only skill directory is writable Restart=on-failure # Restart only on crashes (not always)

Network Binding

Default: 127.0.0.1 (localhost only) Not accessible from network without SSH tunnel or VPN No public exposure risk

Running as Root (Not Recommended)

If you choose root during install: โš ๏ธ Full system access if compromised โš ๏ธ No privilege separation โš ๏ธ Only suitable for trusted, isolated environments Use the dedicated user option for production deployments.

Change Port

Edit /root/clawd/skills/security-dashboard/server.js: const PORT = 18791; // Change this Then restart: sudo systemctl restart security-dashboard

Change Binding

Default: 127.0.0.1 (localhost only - secure) Alternative: 0.0.0.0 (all interfaces - only with Tailscale!) Edit server.js line 445: server.listen(PORT, '127.0.0.1', () => { // Change '127.0.0.1' to '0.0.0.0' if needed }); โš ๏ธ Security Warning: Only bind to 0.0.0.0 if behind Tailscale or firewall!

Customize Metrics

Add custom checks in server.js: getOpenClawMetrics() - OpenClaw-specific metrics getNetworkMetrics() - Network security getSystemMetrics() - System-level checks getPublicExposure() - Port/binding analysis

๐Ÿฆž OpenClaw Security

Gateway running/stopped status Binding configuration (loopback/public) Auth token length and mode Active sessions + subagents Skills count Current version + update availability

๐ŸŒ Network Security

Tailscale connection status + IP Public ports count Firewall status (UFW/firewalld) Active TCP connections

๐ŸŒ Public Exposure

Exposure level (Excellent/Minimal/Warning/High) Public port details (service names) Kanban board binding Security dashboard binding OpenClaw gateway binding Tailscale active/inactive Security recommendations

๐Ÿ–ฅ๏ธ System Security

Updates available Server uptime Load average Failed SSH logins (24h) Root processes count

๐Ÿ”‘ SSH & Access Control

SSH service status Password authentication (enabled/disabled) fail2ban status Banned IPs count Active SSH sessions

๐Ÿ“œ Certificates & TLS

Caddy status Public TLS enabled/disabled Tailscale WireGuard encryption

๐Ÿ“Š Resource Security

CPU usage percentage Memory usage percentage Disk usage percentage Config file permissions (should be 600)

Security Alerts

Dashboard generates real-time alerts: Critical (Red): Weak gateway token (< 32 chars) SSH password authentication enabled Insecure config permissions (not 600) Firewall inactive (UFW/firewalld not running) fail2ban inactive (SSH brute-force protection disabled) Warning (Yellow): Tailscale disconnected 20+ system updates available 10+ failed login attempts in 24h Disk > 80% full Info (Blue): Gateway exposed without Tailscale Non-standard configurations

Morning Briefing

Add security status to morning report: curl -s http://localhost:18791/api/security | jq '.status'

Heartbeat Checks

Monitor for critical alerts: curl -s http://localhost:18791/api/security | \ jq '.alerts[] | select(.level == "critical")'

Alerting Integration

Pipe alerts to notification systems: ./scripts/check-alerts.sh | xargs -I {} notify-send "Security Alert" "{}"

Architecture

Backend: Node.js HTTP server Frontend: Vanilla JavaScript (no frameworks) Port: 18791 (configurable) Binding: 127.0.0.1 (localhost only) Service: systemd unit Files: server.js - Main backend (metrics collection + API) public/index.html - Dashboard UI lib/ - Shared utilities (if needed)

Dependencies

Node.js (v18+) systemctl - Service management ss - Socket statistics ufw or firewalld - Firewall check tailscale - VPN status (optional) fail2ban - Ban tracking (optional) openclaw - Gateway monitoring All dependencies are standard Linux utilities except OpenClaw.

Dashboard not loading

Check service status: sudo systemctl status security-dashboard Check logs: sudo journalctl -u security-dashboard -n 50 Verify port is listening: ss -tlnp | grep 18791 Test API directly: curl http://localhost:18791/api/security

Gateway Status "Unknown"

Verify OpenClaw gateway is running: pgrep -f openclaw-gateway Check OpenClaw config exists: cat ~/.openclaw/openclaw.json

Metrics showing "Unknown"

Commands may require sudo permissions Check script execution permissions Verify paths exist (sessions, skills, etc.)

Uninstall

sudo systemctl stop security-dashboard sudo systemctl disable security-dashboard sudo rm /etc/systemd/system/security-dashboard.service sudo systemctl daemon-reload Then remove skill directory: rm -rf /root/clawd/skills/security-dashboard

Publishing

To publish to ClawdHub: clawdhub publish security-dashboard

License

MIT

Author

Created by Erdma for Brian Christner's infrastructure monitoring.

Category context

Long-tail utilities that do not fit the current primary taxonomy cleanly.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
3 Scripts2 Docs1 Files
  • SKILL.md Primary doc
  • README.md Docs
  • scripts/check-security.sh Scripts
  • scripts/install.sh Scripts
  • scripts/publish.sh Scripts
  • public/index.html Files