3.4 KiB
OpenClaw Dashboard (Public)
Mobile-first operations dashboard for OpenClaw, focused on sessions, costs, cron, watchdog, and day-to-day operations.
This public repository is sanitized and simplified for sharing.
Install via ClawHub
clawhub install openclaw-dashboard
cd ~/.openclaw/workspace/skills/openclaw-dashboard
cp env.example .env
node api-server.js
Then open http://localhost:18791
Quick Start (from source)
git clone https://github.com/JonathanJing/openclaw-dashboard.git
cd openclaw-dashboard
cp env.example .env
# edit .env with your own values
node api-server.js
Then open:
http://localhost:18791/
Required Configuration
Default install has no hard key requirement.
OPENCLAW_AUTH_TOKENis optional but recommended for protected/local-auth usage.gateway.authTokenis treated as optional capability context in skill metadata.
Use env.example (ClawHub package) or .env.example (source checkout) for optional overrides.
Compliance Defaults (Important)
This public package now ships with restricted defaults:
- Dashboard binds to localhost by default (
DASHBOARD_HOST=127.0.0.1) - No automatic loading of
~/.openclaw/keys.envunlessOPENCLAW_LOAD_KEYS_ENV=1 - Provider org audit endpoint disabled unless
OPENCLAW_ENABLE_PROVIDER_AUDIT=1 - Config file view endpoint (
/ops/config) disabled unlessOPENCLAW_ENABLE_CONFIG_ENDPOINT=1 - Absolute-path attachment copy mode disabled unless
OPENCLAW_ALLOW_ATTACHMENT_FILEPATH_COPY=1 - Even when enabled, attachment copy only allows repo-local paths by default
- Extra source paths require explicit flags:
OPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_TMP=1,OPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_WORKSPACE=1, and/orOPENCLAW_ALLOW_ATTACHMENT_COPY_FROM_OPENCLAW_HOME=1 - User-scoped systemctl restart disabled unless
OPENCLAW_ENABLE_SYSTEMCTL_RESTART=1 - Frontend no longer sends auth token in query parameters for API calls
- Cron/task text sent to hooks is sanitized and treated as untrusted payload
- Mutating operations are disabled unless
OPENCLAW_ENABLE_MUTATING_OPS=1and request is from localhost server-monitor.htmlnow uses integrated authenticated/metricsendpoint
These defaults reduce accidental secret ingestion and over-broad local file access.
Core Files
api-server.js: backend API and operations logicagent-dashboard.html: single-file frontend UISKILL.md: repository-level agent instructions
Security Notes
- No real tokens should be committed.
- Keep secrets in local environment files only.
- Rotate tokens immediately if exposure is suspected.
VirusTotal Compliance
Run a pre-release hash and upload workflow before publishing:
shasum -a 256 api-server.js agent-dashboard.html SKILL.md README.md env.example > vt-hashes.txt
Then submit these hashes/files to VirusTotal and attach the report IDs to your release notes.
If any file is flagged, block release and investigate before publishing.
Publish to ClawHub
This repository is prepared as a ClawHub skill package with root-level SKILL.md.
clawhub publish . \
--slug openclaw-dashboard \
--name "OpenClaw Dashboard" \
--version 1.0.9 \
--changelog "Risk-surface reduction: localhost bind default, no token-in-query API usage, tighter attachment copy defaults, and integrated /metrics endpoint."
If your local version changes, update both:
SKILL.mdfrontmatterversionclawhub publish --version
License
MIT