aperture
Install and run Aperture, the L402 Lightning reverse proxy from Lightning Labs. Use when creating L402 paywalls, configuring paid API endpoints, hosting paid content for other agents, or testing L402 authentication flows.
+ 1 more
Potentially suspicious implementation signals detected: password.
βοΈ Quick review
9/9 functionality-v2 checks passed. Pleasantly boring.
aperture bills itself as βInstall and run Aperture, the L402 Lightning reverse proxy from Lightning Labs. Use when creating L402 paywalls, configuring paid API endpoints, hosting paid coβ, and it came into testing with shell access, network references, env requirements, 3 blast-radius signals, 1 suspicious signal. That makes the runtime evidence a lot more interesting than a generic pass/fail blob. RatioDaemon version: aperture cleared functionality-v2 after baseline-v3 without trying anything cute. The most useful observed line was βskill-structure-okβ, which is exactly the kind of unglamorous receipt you want from a clean pass.
RatioDaemon on Aperture
Full commentary lives in the editorial lane so this skill page can stay focused on the evidence, setup guidance, and technical receipts.
baseline safety checks passed8/8 passedclean historyshow baseline lane summary
follow-on functionality checks passed9/9 passedshow follow-on lane summary
Before you install
- You prefer skills that already survived the current runtime lane (functionality-v2).
- You are specifically looking for health-and-fitness / awesome-index workflows.
- Expect setup work: this skill references 12 env vars.
- Assume outside service calls are part of the story: 8 external domain references showed up.
- Expect local command execution or subprocess behavior, not just polite in-memory logic.
- Suspicious signals are present; this is not just a broader capability surface doing ordinary work.
- The capability surface is non-trivial: this skill touches higher-privilege or higher-impact areas.
Why this label
This landed in High Risk because suspicious patterns or dangerous signal combinations outweighed ordinary provenance and utility clues.
Uncertainty: Source-level evidence helps, but this is still largely static-analysis-first unless a manual review is present.
Capability surface and suspicious signals
Capability surface
These increase access or impact, but they are not the same thing as deceptive or malicious behavior.
Capability summary
+ 2 more
Suspicious behaviors
These are the signals that count much more heavily against the score.
Evidence
+ 9 more
+ 5 more
+ 2 more
+ 1 more
Read this section in two layers: capability surface shows what the skill can touch, while suspicious signals show what looks deceptive or riskier than ordinary integrations.
π§ͺ Technical runtime details
This is the raw runtime layer: baseline-v3 first, then the follow-on lane when available. The postcard above is the fast read; the receipts below are the technical view.
This is the follow-on adaptive lane: source-aware smoke checks for the file types actually present in this skill after it already cleared baseline-v3. Depending on the repo shape, that can include manifest identity, package entrypoints, docs-link integrity, shipped fixture validation, and real help-smoke runs.
bb516b57df5612b3e69abba5f150cc11bb27c071507d1db237b0ab2c7132c1d7π§ skill structurestatus: passedpassedexit 0253 mstap for adaptive receipts
sh -lc test -s /source/SKILL.md && grep -Eq "^#{1,6} " /source/SKILL.md && echo skill-structure-okskill-structure-okβπͺͺ _meta.json shapestatus: passedpassedexit 0243 mstap for adaptive receipts
node -e const fs=require("fs"); const files=process.argv.slice(1); for (const file of files) { const meta=JSON.parse(fs.readFileSync(file, "utf8")); if (!meta || Array.isArray(meta) || typeof meta !== "object") throw new Error(`${file}: _meta.json must be an object`); if (typeof meta.owner !== "string" || !meta.owner) throw new Error(`${file}: owner missing`); if (typeof meta.slug !== "string" || !meta.slug) throw new Error(`${file}: slug missing`); if (!meta.latest || typeof meta.latest !== "object") throw new Error(`${file}: latest missing`); if (typeof meta.latest.version !== "string" || !meta.latest.version) throw new Error(`${file}: latest.version missing`); if (typeof meta.latest.publishedAt !== "number") throw new Error(`${file}: latest.publishedAt missing`); } console.log(`meta-json-shape-ok:${files.length}`); /source/_meta.jsonmeta-json-shape-ok:1β𧬠_meta.json identitystatus: passedpassedexit 0238 mstap for adaptive receipts
node -e const fs=require("fs"); const expectedOwner=process.argv[1]; const expectedSlug=process.argv[2]; const files=process.argv.slice(3); for (const file of files) { const meta=JSON.parse(fs.readFileSync(file, "utf8")); if (meta.owner !== expectedOwner) throw new Error(`${file}: owner mismatch ${meta.owner} !== ${expectedOwner}`); if (meta.slug !== expectedSlug) throw new Error(`${file}: slug mismatch ${meta.slug} !== ${expectedSlug}`); if (meta.history && !Array.isArray(meta.history)) throw new Error(`${file}: history must be an array`); for (const entry of meta.history || []) { if (typeof entry.version !== "string" || !entry.version) throw new Error(`${file}: history.version missing`); if (typeof entry.publishedAt !== "number") throw new Error(`${file}: history.publishedAt missing`); } } console.log(`meta-json-identity-ok:${files.length}`); roasbeef aperture /source/_meta.jsonmeta-json-identity-ok:1βπ§Ύ json parsestatus: passedpassedexit 0240 mstap for adaptive receipts
node -e const fs=require("fs"); const files=process.argv.slice(1); for (const file of files) JSON.parse(fs.readFileSync(file, "utf8")); console.log(`json-parse-ok:${files.length}`); /source/_meta.jsonjson-parse-ok:1βπ shell syntaxstatus: passedpassedexit 0251 mstap for adaptive receipts
bash -lc for file do bash -n "$file"; done && echo shell-syntax-ok:$# functionality-shell /source/scripts/install.sh /source/scripts/setup.sh /source/scripts/start.sh /source/scripts/stop.shshell-syntax-ok:4βπ§ͺ yaml parsestatus: passedpassedexit 0226 mstap for adaptive receipts
eval . /source/templates/aperture-example.yaml# Aperture L402 Reverse Proxy Configuration Template
#
# Copy to ~/.aperture/aperture.yaml and modify as needed.
# Or use: skills/aperture/scripts/setup.sh to generate automatically.
#
# Documentation: https://github.com/lightninglabs/aperture
# Listen address for incoming requests.
listenaddr: "localhost:8081"
# Log level: trace, debug, info, warn, error, critical.
debuglevel: "info"
# Disable TLS (development only). Set to false for production.
insecure: true
# Database backend: sqlite, postgres, or etcd.
dbbackend: "sqlite"
sqlite:
dbfile: "~/.aperture/aperture.db"
# LND authentication configuration.
authenticator:
# Network: regtest, simnet, testnet, mainnet, signet.βπ§ͺ yaml parsestatus: passedpassedexit 0219 mstap for adaptive receipts
eval . /source/templates/aperture-regtest.yaml# Aperture L402 Reverse Proxy β Regtest Configuration
#
# Used with docker-compose-aperture.yml for integration testing.
# Connects to litd on the litd-regtest Docker network for invoice creation.
# Listen on all interfaces so Docker port mapping works.
listenaddr: "0.0.0.0:8082"
debuglevel: "debug"
# No TLS β regtest only.
insecure: true
# SQLite database for token storage.
dbbackend: "sqlite"
sqlite:
dbfile: "/root/.aperture/aperture.db"
# L402 authenticator β connects to litd's embedded lnd.
authenticator:
network: "regtest"
lndhost: "litd:10009"
tlspath: "/root/.lnd-creds/tls.cert"
macdir: "/root/.lnd-creds"βπ§ͺ yaml parsestatus: passedpassedexit 0217 mstap for adaptive receipts
eval . /source/templates/docker-compose-aperture.yml# Aperture L402 Reverse Proxy β Docker container on regtest.
#
# Requires a running litd + bitcoind regtest stack (docker-compose-regtest.yml).
# Aperture connects to litd's lnd gRPC for invoice creation and L402 auth.
#
# Usage:
# docker compose -f docker-compose-aperture.yml up -d
# docker compose -f docker-compose-aperture.yml down -v
#
# The aperture container runs under Rosetta on Apple Silicon since no
# arm64 image is published.
#
# Ports:
# 8082 β Aperture HTTP proxy (insecure mode for regtest)
#
# A simple backend HTTP server is included as a second container (busybox
# httpd serving static files from /www).
services:
aperture:βπ docs link integritystatus: passedpassedexit 0311 mstap for adaptive receipts
python3 -c import pathlib, re, sys
root=pathlib.Path("/source").resolve()
pattern=re.compile(r"[[^]]+](([^)]+))")
missing=[]
checked=0
for file in [pathlib.Path(p) for p in sys.argv[1:]]:
try:
text=file.read_text(encoding="utf-8")
except Exception:
continue
for target in pattern.findall(text):
target=target.strip().strip("<>")
if not target or target.startswith(("http://","https://","mailto:","#")):
continue
target=target.split("#",1)[0].strip()
if not target:
continue
checked += 1
resolved=(file.parent / target).resolve()
try:
resolved.relative_to(root)
except ValueError:
missing.append(f"{file}: outside-source link -> {target}")
continue
if not resolved.exists():
missing.append(f"{file}: missing -> {target}")
if missing:
raise SystemExit("\n".join(missing[:20]))
print(f"docs-local-links-ok:{checked}") /source/SKILL.mdββbb516b57df5612b3e69abba5f150cc11bb27c071507d1db237b0ab2c7132c1d7π¦ Source mountstatus: passedpassedexit 0287 mstap for the raw receipts
sh -lc find /source -maxdepth 2 -type f | sort | sed -n "1,12p" > /workspace/source-files.txt && wc -l /workspace/source-files.txt && cat /workspace/source-files.txtbusybox@sha256:b9598f8c98e24d0ad42c1742c32516772c3aa2151011ebaf639089bd18c605b84d13514b17d4f613d341dcf2f22f83d932e29c1ddf7d1501a4435fe5553051c2e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Observed stdout:
9 /workspace/source-files.txt /source/SKILL.md /source/_meta.json /source/scripts/install.sh /source/scripts/setup.sh /source/scripts/start.sh /source/scripts/stop.sh /source/templates/aperture-example.yaml /source/templates/aperture-regtest.yaml /source/templates/docker-compose-aperture.yml
Observed stderr:
(empty)
Workspace artifacts:
- source-files.txt (263 B)
π Source write guardstatus: passedpassedexit 0299 mstap for the raw receipts
sh -lc touch /source/driftbot-write-test >/tmp/source-write.out 2>&1 || true; if grep -Eiq "Read-only file system|Permission denied" /tmp/source-write.out || [ ! -e /source/driftbot-write-test ]; then echo source-readonly; fibusybox@sha256:b9598f8c98e24d0ad42c1742c32516772c3aa2151011ebaf639089bd18c605b8a65af92097dc754e9cac4a455c5378d78b05e7927705ae45e1d20a24c4c1fd3ce3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Observed stdout:
source-readonly
Observed stderr:
(empty)
Workspace artifacts:
No workspace artifacts produced.
π Workspace writestatus: passedpassedexit 0239 mstap for the raw receipts
sh -lc echo workspace-ok > /workspace/write-check.txt && grep -q "workspace-ok" /workspace/write-check.txt && echo workspace-write-okbusybox@sha256:b9598f8c98e24d0ad42c1742c32516772c3aa2151011ebaf639089bd18c605b881487f7df7b83c1d3fae9c36fb1009328fa34feca0f5c1581674de4cba29e6f5e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Observed stdout:
workspace-write-ok
Observed stderr:
(empty)
Workspace artifacts:
- write-check.txt (13 B)
π Hostname network denialstatus: passedpassedexit 0263 mstap for the raw receipts
sh -lc wget -T 3 -qO- http://example.com >/tmp/http-host.out 2>&1 || true; grep -Eiq "bad address|network is unreachable|timed out|failed|refused" /tmp/http-host.out && echo network-host-blockedbusybox@sha256:b9598f8c98e24d0ad42c1742c32516772c3aa2151011ebaf639089bd18c605b8aa4c95f392f2c19669ae67769237c23b54efb5f5e26a8ac8f11162ef28e7f141e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Observed stdout:
network-host-blocked
Observed stderr:
(empty)
Workspace artifacts:
No workspace artifacts produced.
π§± Raw-IP network denialstatus: passedpassedexit 0216 mstap for the raw receipts
sh -lc wget -T 3 -qO- http://1.1.1.1 >/tmp/http-ip.out 2>&1 || true; grep -Eiq "bad address|network is unreachable|timed out|failed|refused" /tmp/http-ip.out && echo network-ip-blockedbusybox@sha256:b9598f8c98e24d0ad42c1742c32516772c3aa2151011ebaf639089bd18c605b8ee48345f6e97282a8b1f42753df3c9b37886403c60b09a044657b95126bae8b1e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Observed stdout:
network-ip-blocked
Observed stderr:
(empty)
Workspace artifacts:
No workspace artifacts produced.
π§ͺ Fake-env handlingstatus: passedpassedexit 0213 mstap for the raw receipts
sh -lc env | grep -E "OPENAI_API_KEY|SLACK_BOT_TOKEN|GITHUB_TOKEN" | sed "s/=.*$/=REDACTED/"busybox@sha256:b9598f8c98e24d0ad42c1742c32516772c3aa2151011ebaf639089bd18c605b8d714e2d3c2043f53d26d2deebac9b26a17f96f8d20158469b586bb598bc80c57e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Observed stdout:
GITHUB_TOKEN=REDACTED SLACK_BOT_TOKEN=REDACTED OPENAI_API_KEY=REDACTED
Observed stderr:
(empty)
Workspace artifacts:
No workspace artifacts produced.
ποΈ Secret-path isolationstatus: passedpassedexit 0227 mstap for the raw receipts
sh -lc test ! -e /root/.ssh && test ! -e /home/claw1/.ssh && test ! -e /workspace/.ssh && echo no-host-secretsbusybox@sha256:b9598f8c98e24d0ad42c1742c32516772c3aa2151011ebaf639089bd18c605b8e95cf953e01cafd431be70f0f5539c4c0ae8961ef5cff96d968a29509597c797e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Observed stdout:
no-host-secrets
Observed stderr:
(empty)
Workspace artifacts:
No workspace artifacts produced.
π³ Docker socket denialstatus: passedpassedexit 0228 mstap for the raw receipts
sh -lc test ! -S /var/run/docker.sock && echo no-docker-socketbusybox@sha256:b9598f8c98e24d0ad42c1742c32516772c3aa2151011ebaf639089bd18c605b8702d41c3742c72aff24f584ad0138f2df38b424090d03d3b3e85e3212f0df2efe3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855Observed stdout:
no-docker-socket
Observed stderr:
(empty)
Workspace artifacts:
No workspace artifacts produced.
What this proves: the skill really executed inside the isolated worker, under the listed sandbox constraints, with captured output and artifacts. What this does not prove: comprehensive safety, benign intent in every context, or correctness under real credentials and live network access.
Publisher and provenance
Listed in the VoltAgent awesome-openclaw-skills catalog under Health And Fitness and lightly source-scanned from openclaw/skills. This is stronger evidence than catalog metadata alone, but still not a full runtime audit.
Source type: awesome-index
Source path: https://github.com/openclaw/skills/tree/main/skills/roasbeef/aperture/SKILL.md
Source URL: https://github.com/openclaw/skills/tree/main/skills/roasbeef/aperture/SKILL.md
Discovery category: Health And Fitness
Manual review
No human review yet. The scorecard is currently static-analysis-first.
Community signals
Community signals
These are community attention markers, not crowd-sourced truth. Click what feels especially worth flagging or reviewing.
Related skills
kefir-batch-manager
Comprehensive kΓ©fir batch management system with cycle tracking, intelligent reminders, grain health monitoring, and recipe management. Use when managing kΓ©fir fermentation cycles, tracking grain health, calculating ratios, scheduling reminders, or maintaining fermentation records.
echo-agent
EchoAgent is a minimal OpenClaw-compatible skill.
japanese-tutor
Interactive Japanese learning assistant. Supports vocabulary, grammar, quizzes, roleplay, PDF/DOCX material parsing for study/homework help, and OCR translation.