gateway-guardEnsures OpenClaw gateway auth consistency. Use when checking or fixing gateway token/password mismatch, device_token_mismatch errors, or before delegating to...
Install via ClawdBot CLI:
clawdbot install austindixson/gateway-guardGrade Good — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://github.com/YOUR_ORG/gateway-guard.gitAudited Apr 16, 2026 · audit v1.0
Generated Mar 1, 2026
When a DevOps team encounters 'device_token_mismatch' errors in OpenClaw gateway logs during deployment, this skill automatically checks and corrects auth inconsistencies between the running gateway and configuration files. It ensures continuous operation by restarting the gateway with correct credentials, preventing downtime in CI/CD pipelines. This is critical in environments where multiple agents or sub-agents rely on stable gateway connections for automated workflows.
IT support teams use this skill before delegating tasks to sub-agents in an OpenClaw orchestrator flow, verifying gateway auth status to avoid unauthorized errors. It automates the pre-check process, reducing manual intervention when users report TUI disconnects or gateway issues. This ensures reliable agent spawning and session management in enterprise automation platforms.
In production systems, this skill runs as a LaunchAgent watcher to periodically sync gateway tokens and auto-prompt 'continue' on run errors from gateway logs. It maintains auth consistency and recovers from 'Unhandled stop reason: error' events, minimizing manual recovery efforts. This is essential for high-availability setups where gateway stability impacts overall system performance.
Developers integrating OpenClaw into new projects use this skill to verify gateway configurations after installations or updates, ensuring auth matches between openclaw.json and the running gateway. It supports read-only testing with --json flags before applying changes, facilitating safe experimentation in non-production environments. This accelerates development cycles by automating configuration validation.
This skill can be bundled as part of a SaaS offering that provides managed OpenClaw gateway services, ensuring auth consistency and error recovery for clients. Revenue is generated through subscription fees for automated monitoring and support, reducing client downtime and support costs. It targets businesses using OpenClaw for agent-based automation in their operations.
IT consulting firms offer implementation services using this skill to set up and maintain OpenClaw gateway systems for enterprises. Revenue comes from project-based fees for installation, configuration, and ongoing maintenance, leveraging the skill's automation to streamline deployments. This model benefits organizations lacking in-house expertise for complex agent orchestration setups.
Managed service providers incorporate this skill into their DevOps support packages to proactively monitor and fix gateway auth issues for clients. Revenue is derived from service-level agreements (SLAs) that guarantee uptime and quick resolution of errors like device_token_mismatch. This model appeals to companies outsourcing their infrastructure management to ensure reliability.
💬 Integration Tip
Test the skill in a non-production environment first using read-only commands like 'status --json' to avoid unintended config changes, and ensure OPENCLAW_HOME paths are correctly set before installing the LaunchAgent watcher for automated recovery.
Scored Apr 16, 2026
Manage and operate ClawSec Monitor v3.0, a MITM HTTP/HTTPS proxy that logs AI agent traffic, detects exfiltration and injection threats in real time.
Safe command execution for OpenClaw Agents with automatic danger pattern detection, risk assessment, user approval workflow, and audit logging. Use when agen...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
MoltGuard — OpenClaw security guard by OpenGuardrails. Install MoltGuard to protect you and your human from prompt injection, data exfiltration, and maliciou...
577+ pattern prompt injection defense. Now with typo-tolerant bypass detection. TieredPatternLoader fully operational. Drop-in defense for any LLM application.