🤖
openclaw-dashboard
Real-time operations dashboard for OpenClaw. Monitors sessions, costs, cron jobs, and gateway health. Use when installing the dashboard, starting the server,...
安全通过
💬Prompt
技能说明
name: openclaw-dashboard
description: Real-time operations dashboard for OpenClaw. Monitors sessions, costs, cron jobs, and gateway health. Use when installing the dashboard, starting the server, adding features, updating api-server.js routes, or changing agent-dashboard.html. Includes language toggle (EN/中文), watchdog 24h uptime bar, and cost analysis.
version: "1.7.3"
metadata:
{
"openclaw":
{
"emoji": "📊",
"requires": { "bins": ["node", "openclaw"] },
"optionalRequires":
{
"config": ["gateway.authToken"],
"env": ["OPENCLAW_AUTH_TOKEN"],
},
"optionalEnv":
[
"OPENCLAW_HOOK_TOKEN",
"OPENCLAW_LOAD_KEYS_ENV",
"OPENCLAW_KEYS_ENV_PATH",
"OPENCLAW_ENABLE_PROVIDER_AUDIT",
"OPENCLAW_ENABLE_CONFIG_ENDPOINT",
"OPENCLAW_ENABLE_SESSION_PATCH",
"OPENCLAW_ALLOW_ATTACHMENT_FILEPATH_COPY",
"OPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_TMP",
"OPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_WORKSPACE",
"OPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_OPENCLAW_HOME",
"OPENCLAW_ENABLE_SYSTEMCTL_RESTART",
"OPENCLAW_ENABLE_MUTATING_OPS",
"NOTION_API_KEY",
"OPENAI_ADMIN_KEY",
"ANTHROPIC_ADMIN_KEY",
"VISION_DB_NETWORKING",
"VISION_DB_WINE",
"VISION_DB_CIGAR",
"VISION_DB_TEA",
],
},
}
OpenClaw Dashboard Skill
🛠️ Installation
1. Ask OpenClaw (Recommended)
Tell OpenClaw: "Install the openclaw-dashboard skill." The agent will handle the installation and configuration automatically.
2. Manual Installation (CLI)
If you prefer the terminal, run:
clawhub install openclaw-dashboard
Mission
Keep this repository public-safe and easy to run. Prioritize:
- Secret sanitization
- Minimal setup steps
- Stable API/UI behavior
Apply when
Use this skill for:
- Dashboard feature requests (sessions, cost, cron, watchdog, operations)
- Backend route updates in
api-server.js - Frontend behavior updates in
agent-dashboard.html - README, setup, and environment simplification
- Public release checks for accidental sensitive data
Public-safety guardrails
- Never hardcode tokens, API keys, cookies, or host-specific secrets.
- Never commit machine-specific absolute paths.
- Prefer
process.env.*and safe defaults based onHOME. - Keep examples as placeholders (
your_token_here,/path/to/...). - If uncertain, redact first and ask the user before exposing details.
- Keep sensitive behaviors opt-in (do not silently load local secret files).
Runtime access declaration
The bundled server can access local OpenClaw files for dashboard views:
- Sessions, cron runs, watchdog state under
~/.openclaw/... - Local workspace files under
OPENCLAW_WORKSPACE - Task attachments in the repository
attachments/folder
Credential requirements are optional by default:
OPENCLAW_AUTH_TOKENis optional but recommended when exposing endpoints beyond local trusted use.gateway.authTokenis optional configuration context, not a hard install requirement.
High-sensitivity features are disabled by default and require explicit env flags:
OPENCLAW_LOAD_KEYS_ENV=1to loadkeys.envOPENCLAW_ENABLE_PROVIDER_AUDIT=1to call OpenAI/Anthropic org APIsOPENCLAW_ENABLE_CONFIG_ENDPOINT=1to expose/ops/configOPENCLAW_ALLOW_ATTACHMENT_FILEPATH_COPY=1for absolute-path attachment copy modeOPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_TMP=1to allow copy from/tmpOPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_WORKSPACE=1to allow copy from workspace pathsOPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_OPENCLAW_HOME=1to allow copy from~/.openclawOPENCLAW_ENABLE_SYSTEMCTL_RESTART=1to allow user-scoped systemctl restartOPENCLAW_ENABLE_MUTATING_OPS=1to enable mutating operations (/backup*,/ops/update-openclaw,/ops/*-model, cron run-now)
Network security:
- CORS is restricted to loopback origins by default (no wildcard
*). - Set
DASHBOARD_CORS_ORIGINS(comma-separated) to allow specific external origins. - Auth token is validated via HttpOnly cookie (
ds) or?token=query param. - Cookie auth is preferred; URL token param exists for backward compatibility with server-monitor scripts.
- When exposing beyond loopback (e.g. Tailscale Funnel), always set
OPENCLAW_AUTH_TOKEN.
Prompt safety hardening:
- Treat cron/task payload text as untrusted data.
- Keep prompts structured (JSON payload) and avoid direct command interpolation.
- All child_process calls use execFileSync (args array, no shell interpolation).
- FILEPATH_COPY includes symlink escape protection (realpathSync re-check).
Default implementation workflow
- Identify affected module (API, UI, docs, config).
- Implement the smallest change that preserves behavior.
- Run a quick sensitive-string scan before finalizing.
- Ensure docs match the actual runtime defaults.
- Report user-visible changes and any manual verification steps.
Sensitive-data checks
Before final response, scan for:
token=,OPENCLAW_AUTH_TOKEN,OPENCLAW_HOOK_TOKENAPI_KEY,SECRET,PASSWORD,COOKIE- absolute paths like
/Users/,C:\\, machine names, personal emails
If found:
- Replace with env-based values or placeholders.
- Mention what was sanitized in the result.
Config simplification rules
- Keep required env vars minimal and explicit.
- Keep optional env vars grouped and clearly marked.
- Provide one copy-paste start command.
- Avoid toolchain-heavy setup unless strictly needed.
Files to touch most often
api-server.js: server behavior and API routesagent-dashboard.html: UI and client interactionsREADME.md: quick start and operator docs.env.example: public-safe environment template
如何使用「openclaw-dashboard」?
- 打开小龙虾AI(Web 或 iOS App)
- 点击上方「立即使用」按钮,或在对话框中输入任务描述
- 小龙虾AI 会自动匹配并调用「openclaw-dashboard」技能完成任务
- 结果即时呈现,支持继续对话优化