CLAWSTIN MORNING PAPER β€” 2026-03-18

Wednesday, 2026-03-18

TRADING DASHBOARD

TRADING P&L DASHBOARD β€” Daily target: $10/day
Track Today Total P&L Notes
πŸ“ˆ Agent Trader $+0.00 $+0.00 Swing, public.com
🎲 Polymarket β€” $+0.00 Structural arb, slow
Net (after tax + costs) $-0.10 vs $10 target: $-10.10

Cost breakdown: tax 37% short-term ($0.00) + token spend ($0.10/day) | Go-live trigger: 5 consecutive profitable weeks in paper trading

INNOVATIONS

RESEARCHER

Researcher Report β€” 2026-03-18

Run time: 2026-03-18 01:05 ET Agent: Researcher (Haiku scan / Sonnet eval) Budget: Budget: $0.0278 / $5.00 used (50 calls, 18757in + 3206out tokens) | $4.9722 remaining


Phase 1: Tech Research


Sources scanned: 776 items across HN + RSS feeds Candidates after scoring: 15 CBL evaluated: 15

EAT (queued to fridge)

- [EAT] Adaptive Theory of Mind for LLM-based Multi-Agent Coordination β€” _βœ… queued_

HOLD (notable but not fridged)

- [HOLD] Anticipatory Planning for Multimodal AI Agents β€” - [HOLD] Surg$\Sigma$: A Spectrum of Large-Scale Multimodal Data and Foundation Models for Surgical Intelligence β€” - [HOLD] Data-Local Autonomous LLM-Guided Neural Architecture Search for Multiclass Multimodal Time-Series Classification β€” - [HOLD] Structure-Aware Multimodal LLM Framework for Trustworthy Near-Field Beam Prediction β€” - [HOLD] Alignment-Aware Quantization for LLM Safety β€” - _(and 9 more HOLD items)_


Phase 2: PaperTrader Experiments


_No snapshot data available for today._

Phase 2 Errors

- ⚠️ No snapshot for today β€” cannot analyze performance


Phase 3: Optimization Analysis


> _Stale files and cron health are auditor territory (autoaudit). This phase covers cost and model routing only._

Session Model Usage (23 sessions, last 7d)


| Model | Mentions | Share | |-------|----------|-------| | Opus | 38 | 51% | | Sonnet | 13 | 17% | | Haiku | 24 | 32% |
Opus-heavy sessions: - `2026-03-14-session-02.md` (3x Opus) β€” Session 02 β€” 2026-03-14 (20:43-23:13 EDT, Opus) - `2026-03-14-session-01.md` (3x Opus) β€” Session 01 β€” 2026-03-14 (08:12-20:43 EDT, Sonnetβ†’Opus) - `2026-03-12-session-26.md` (4x Opus) β€” Session 26 β€” 2026-03-12 (00:00–01:46 EDT, Opus) - `2026-03-11-session-25.md` (3x Opus) β€” Session 25 β€” 2026-03-11 (22:03–23:57 EDT, Opus) - `2026-03-11-session-20.md` (4x Opus) β€” Session 20 β€” 2026-03-11 (11:17–13:27 EDT, Opus)

Researcher Budget History


- last run: $0.0000 / $5.00 (0% utilized, 0 API calls)

Cron Model Routing Suggestions


- bizbot (currently Opus): Evaluate if Sonnet or Haiku could handle this task β€” ~10-50x cost reduction per run - agent-trader-premarket (currently Opus): Evaluate if Sonnet or Haiku could handle this task β€” ~10-50x cost reduction per run

Cost Optimization Opportunities


- Opus referenced in 38 mentions across 23 sessions (51% of model refs) β†’ Review Opus-heavy sessions β€” most tasks could run on Sonnet at ~10x lower cost _Up to ~10x on affected calls_ - Researcher used only $0.0000 of $5.00 cap (0% utilization) β†’ Consider reducing budget_cap_usd or adding more Phase 1/2 analysis depth _N/A β€” currently under-utilized_




Phase 4: ClawHub Skill Scan



35 suspicious skill(s): - [SUSPICIOUS] mcp-skill β€” [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published by low-reputation author, (2) Vague description listing generic capabilities without specifics on implementation or safety boundaries, (3) Requests broad network access (web search, crawling, LinkedIn) and process spawning potential, (4) No visible source code repository linked, (5) Description reads as capability listing directed at AI agents rather than human operators. - [SUSPICIOUS] mcp-hass β€” [SUSPICIOUS]
Red flags present: (1) Zero downloads + very recent publication (2026-02-10), (2) No visible source code repository linked, (3) Requests network access to Home Assistant instances (external service communication), (4) MCP protocol implementation from unverified author requires careful code review for security implications.
If relevant: Would support homelab/automation projects, but requires source code audit before use. - [SUSPICIOUS] openclaw-mcp-plugin β€” [SUSPICIOUS]
Multiple red flags present: zero downloads with new publication date (2026-02-02), no visible source code, requests network access and process spawning capabilities, vague description that could enable arbitrary tool execution, and the skill description reads as instructions to an AI agent ("Enable AI agents to discover and execute tools"). - [SUSPICIOUS] atlassian-mcp β€” [SUSPICIOUS]
This skill exhibits multiple red flags: zero downloads from a new account (2026-01-25), requests Docker process spawning and filesystem access outside workspace, requires external API credentials, lacks visible source code for security audit, and the description reads as task-oriented instructions ("Use when you need to query...") rather than neutral documentation. - [SUSPICIOUS] clickup-mcp β€” [SUSPICIOUS]
Red flags: No visible source code, zero downloads with new account (published 2026-01-06), requests network access and OAuth authentication to external service, and vague operational scope ("manage tasks, docs, time tracking, comments, chat, search") without transparent implementation details. - [SUSPICIOUS] glin-profanity-mcp β€” [SUSPICIOUS]
Red flags present: (1) Zero downloads + new account (published 2026-02-01, author "thegdsks" with no history), (2) No visible source code link provided, (3) Description contains directives framed as use cases ("Use when reviewing batches," "when AI needs") that read as instructions to an AI agent rather than neutral documentation, (4) Vague about actual implementationβ€”claims to provide "profanity detection tools" but doesn't specify what language, model, or API it uses. - [SUSPICIOUS] xiaohongshu-mcp-skill β€” [SUSPICIOUS]
Multiple red flags present: zero downloads with very recent publish date (2026-02-28), no visible source code repository linked, vague description with truncation ("like/comment/fa..."), requests network access to external Xiaohongshu service, and the description phrasing ("Use when user wants to...") reads as agent-directed instructions rather than technical documentation. - [SUSPICIOUS] wordpress-mcp β€” [SUSPICIOUS]
Red flags: Zero downloads + very new publication (2026-02-10), no visible source code repository linked, vague technical requirements ("Requires AI Engine plugin"), and the description is heavily agent-directive focused ("Use for creating/editing posts... when asked about WordPress site management") rather than technical documentation. - [SUSPICIOUS] microsoft-ads-mcp β€” [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account (2026-01-26), (2) No visible source code repository linked, (3) Requests network access to external Microsoft Advertising APIs and likely filesystem access for credentials/config, (4) MCP server skills require process spawning which expands attack surface, (5) Vague on implementation details and security model for handling advertising credentials.
Not relevant to active projects (mcp is in keywords but this is advertising-specific, not infrastructure/automation/monitoring focused). - [SUSPICIOUS] mcp-client β€” [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-02-22), no visible source code mentioned, description is vague about what "tools, data sources and services" it actually connects to, and MCP client skills typically require elevated permissions (network access, process spawning) that warrant explicit disclosure. - [SUSPICIOUS] automation-workflows β€” [SUSPICIOUS]
Red flags: Zero downloads + brand new account (published 2026-02-06), no visible source code repository linked, vague implementation details for a complex tool integration skill, and description reads as general marketing copy rather than technical documentation.
This skill does match the "automation" keyword but insufficient vetting information and new-account status warrant caution before integration. - [SUSPICIOUS] ai-web-automation β€” [SUSPICIOUS]
Multiple critical red flags: zero downloads with new account (2026-02-20 publish date), no visible source code accessible, vague description that could mask malicious behavior, and the skill requests broad capabilities (web automation, form filling, data scraping, process spawning) that inherently require dangerous permissions (network access, filesystem, process execution) without transparent scope documentation. - [SUSPICIOUS] automation-workflows-0-1-0 β€” [SUSPICIOUS]
Red flags: Zero downloads + newly published (2026-02-07) + vague description without visible source code or implementation details + no concrete examples of tool integrations or workflow templates provided. - [SUSPICIOUS] agentic-workflow-automation β€” [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account (2026-02-26), (2) Vague description with truncation ("automation handoff arti..."), (3) No visible source code accessible, (4) Description reads as general AI agent instruction rather than concrete tool documentation, (5) Author handle "0x-Professor" suggests potential obfuscation.
If relevant: Could apply to agent and automation keywords, but insufficient information to validate legitimacy before Ghost review. - [SUSPICIOUS] afrexai-business-automation β€” [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account, (2) No visible source code provided, (3) Description is directed at an AI agent ("Turn your AI agent into...") rather than describing what the skill does, (4) Vague claims about implementing automation "no n8n or Zapier required" without technical specifics, and (5) Broad scope across multiple business domains suggests potential for scope creep or hidden functionality. - [SUSPICIOUS] data-automation-service β€” [SUSPICIOUS]
Multiple red flags: zero downloads with very recent publication date (2026-02-19), vague description lacking technical specifics about API integration methods or data source types, no visible source code repository link, and the generic nature suggests potential for requesting excessive permissions once installed. - [SUSPICIOUS] ai-automation-workflow β€” [SUSPICIOUS]
Multiple red flags: zero downloads + brand new account (published 2026-03-06), no visible source code repository linked, vague implementation details for n8n/Zapier workflow claims, and the description reads partially as directive text ("幫中小企ζ₯­θ¨­θ¨ˆ" = "help SMEs design") rather than neutral skill documentation. - [SUSPICIOUS] afrexai-automation-strategy β€” [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-02-19, author "1kalin" appears to be fresh), vague description (truncated mid-sentence with "across any..."), no visible source code, and the description reads as generic marketing copy rather than concrete functionality documentationβ€”typical markers of low-quality or potentially malicious skill packages. - [SUSPICIOUS] automation-tool β€” [SUSPICIOUS]
Red flags: Zero downloads + brand new account (published 2026-03-08), vague description in Chinese offering "batch generation" with no visible source code or technical details, and the generic nature suggests potential for misuse in automated content spam or manipulation. - [SUSPICIOUS] ai-automation-consulting β€” [SUSPICIOUS]
Multiple red flags: zero downloads with very recent publish date (2026-03-14), new/unverified author account (yang1002378395-cmyk), vague description offering generic "AI automation consulting" with no visible source code or technical implementation details, and the skill appears to be a service offering rather than a functional tool/integration. - [SUSPICIOUS] homelab-cluster β€” [SUSPICIOUS]
Red flags: Zero downloads + newly published (2026-02-12) + vague description lacking implementation details + requests management of "multi-tier AI inference clusters" (likely requires elevated system/network permissions) + no visible source code repository linked. - [SUSPICIOUS] homeserver β€” [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account, (2) Requests significant system access (Docker, SSH, port scanning, filesystem operations, process spawning), (3) No visible source code repository linked, (4) Vague implementation details on how "homebutler CLI" integrates with OpenClaw, (5) Matches keywords but lacks transparency on permission scope and security model.
If investigated: Could support homelab/automation projects, but requires source code review and permission auditing before consideration. - [SUSPICIOUS] raspberry-pi-manager β€” [SUSPICIOUS]
Multiple red flags: zero downloads + newly published account (2026-03-11), no visible source code mentioned, skill requests low-level system access (GPIO control, process spawning for service management) which could enable filesystem/process escape, and the broad "manage devices" description lacks specificity on permission boundaries. - [SUSPICIOUS] pi-admin β€” [SUSPICIOUS]
Red flags: Zero downloads + newly published (2026-01-14), no visible source code mentioned, requests filesystem access and process spawning capabilities (inherent to Pi system administration skills), and vague description lacking implementation details or safety boundaries. - [SUSPICIOUS] pi-health β€” [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-02-09), no visible source code link provided, skill requires filesystem access and process spawning (CPU temp, throttling, fan RPM detection), and the description reads as instructions to an AI agent ("Use when monitoring Pi health, diagnosing..."). - [SUSPICIOUS] trading β€” [SUSPICIOUS]
Red flags present: Zero downloads + newly published (2026-02-12) + vague description lacking technical implementation details + no visible source code repository linked + "trading" keyword match creates relevance bias but skill provides no specifics on how it integrates with OpenClaw architecture. - [SUSPICIOUS] trading-devbox β€” [SUSPICIOUS]
Red flags: Zero downloads + newly published account (2026-02-25), no visible source code mentioned, description implies arbitrary code execution ("agent writes a Python backtest strategy"), and the skill involves executing user-supplied trading logic which presents code injection and financial loss risks. - [SUSPICIOUS] trading-brain β€” [SUSPICIOUS]
This skill exhibits multiple critical red flags: zero downloads combined with a very recent publish date from a new account (classic untrusted pattern), vague description lacking technical specifics about implementation, and the description itself reads as a directive to an AI agent ("Load Travis's personal trading strategy...to guide aggressive trades") rather than objective documentation of what the skill does. - [SUSPICIOUS] openmm-grid-trading β€” [SUSPICIOUS]
Red flags: Zero downloads + newly published (2026-02-25) + unknown author + vague description lacking technical specifics + no visible source code + requests access to trading systems (inherent financial risk) + description reads like a feature pitch rather than implementation detail.
Not recommended for integration without source code audit and author verification. - [SUSPICIOUS] quant-trading-system β€” [SUSPICIOUS]
Red flags detected: Zero downloads + brand new account (published 2026-03-08), no visible source code repository link provided, vague description lacking technical implementation details, and "trading system" implies network requests and external process spawning (high-risk permissions for untrusted code).
Not recommended for review without source code audit and author verification. - [SUSPICIOUS] kalshi-cli-trading β€” [SUSPICIOUS]
This skill exhibits multiple red flags: zero downloads with a very recent publish date (2026-03-04), no visible source code repository, vague truncated description, requests network access to external trading platform, and the author "lacymorrow" has no established reputation on the platform. - [SUSPICIOUS] auto-trading-strategy β€” [SUSPICIOUS]
Red flags present: Zero downloads + new account (published 2026-03-13, author "863king"), vague description lacking technical specifics about implementation, no visible source code repository linked, and the skill name/description suggests financial advisory content which requires higher scrutiny for potential harm or misuse. - [SUSPICIOUS] looloo-trading β€” [SUSPICIOUS]
Multiple red flags: zero downloads with very recent publication date (2026-03-13), vague description that doesn't specify what "LooLoo" is or technical implementation details, no visible source code repository linked, and the skill requests unspecified network access to generate "trade quotes" and "confirmation links" β€” a financial transaction context that demands higher scrutiny for potential credential harvesting or fraud. - [SUSPICIOUS] gate-exchange-trading-copilot β€” [SUSPICIOUS]
Red flags: Zero downloads + newly published account (2026-03-14), vague truncated description ("Use this skill whenever the user wants one skill to complete market judgment, risk control, and..." β€” incomplete sentence), no visible source code, and requests network access to external exchange API with financial transaction capabilities.
Not aligned with active projects (mcp, automation, homelab, raspberry pi, react native, ios, signal, openclaw, cli, monitoring). - [SUSPICIOUS] trading-software-efficiency β€” [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account (2026-03-16), (2) No visible source code accessible via metadata, (3) Vague description lacking technical specifics about implementation, (4) Request pattern matches trading/financial automation which typically requires sensitive permissions and data access.


Budget Summary


Total spent: $0.0278 / $5.00 cap API calls: 50 Tokens: 18757 input + 3206 output
| Model | Input | Output | Cost | Note | |-------|-------|--------|------|------| | claude-haiku-4-5 | 232 | 23 | $0.000278 | CBL:Anticipatory Planning for Multimodal | | claude-haiku-4-5 | 248 | 26 | $0.000302 | CBL:Surg$\Sigma$: A Spectrum of Large-Sc | | claude-haiku-4-5 | 246 | 22 | $0.000285 | CBL:Data-Local Autonomous LLM-Guided Neu | | claude-haiku-4-5 | 244 | 26 | $0.000299 | CBL:Structure-Aware Multimodal LLM Frame | | claude-haiku-4-5 | 233 | 21 | $0.000270 | CBL:Alignment-Aware Quantization for LLM | | claude-haiku-4-5 | 238 | 23 | $0.000282 | CBL:Relationship-Aware Safety Unlearning | | claude-haiku-4-5 | 250 | 26 | $0.000304 | CBL:Can Multimodal LLMs See Science Inst | | claude-haiku-4-5 | 251 | 26 | $0.000305 | CBL:Understanding Quantization of Optimi | | claude-haiku-4-5 | 242 | 26 | $0.000298 | CBL:Towards Robust Multimodal Physiologi | | claude-haiku-4-5 | 234 | 22 | $0.000275 | CBL:Show HN: March Madness Bracket Chall | | claude-haiku-4-5 | 241 | 23 | $0.000285 | CBL:NextMem: Towards Latent Factual Memo | | claude-haiku-4-5 | 250 | 22 | $0.000288 | CBL:Quantum-Secure-By-Construction (QSC) | | claude-haiku-4-5 | 230 | 25 | $0.000284 | CBL:Algorithmic Trading Strategy Develop | | claude-haiku-4-5 | 244 | 23 | $0.000287 | CBL:Argumentative Human-AI Decision-Maki | | claude-haiku-4-5 | 236 | 24 | $0.000285 | CBL:Adaptive Theory of Mind for LLM-base | | claude-haiku-4-5 | 418 | 95 | $0.000714 | ClawHub:mcp-skill | | claude-haiku-4-5 | 407 | 95 | $0.000706 | ClawHub:mcp-hass | | claude-haiku-4-5 | 436 | 72 | $0.000637 | ClawHub:openclaw-mcp-plugin | | claude-haiku-4-5 | 468 | 76 | $0.000678 | ClawHub:atlassian-mcp | | claude-haiku-4-5 | 416 | 66 | $0.000597 | ClawHub:clickup-mcp | | claude-haiku-4-5 | 450 | 120 | $0.000840 | ClawHub:glin-profanity-mcp | | claude-haiku-4-5 | 449 | 87 | $0.000707 | ClawHub:xiaohongshu-mcp-skill | | claude-haiku-4-5 | 476 | 72 | $0.000669 | ClawHub:wordpress-mcp | | claude-haiku-4-5 | 434 | 120 | $0.000827 | ClawHub:microsoft-ads-mcp | | claude-haiku-4-5 | 404 | 73 | $0.000615 | ClawHub:mcp-client | | claude-haiku-4-5 | 495 | 83 | $0.000728 | ClawHub:automation-workflows | | claude-haiku-4-5 | 420 | 86 | $0.000680 | ClawHub:ai-web-automation | | claude-haiku-4-5 | 506 | 48 | $0.000597 | ClawHub:automation-workflows-0-1-0 | | claude-haiku-4-5 | 429 | 117 | $0.000811 | ClawHub:agentic-workflow-automation | | claude-haiku-4-5 | 439 | 104 | $0.000767 | ClawHub:afrexai-business-automation | | claude-haiku-4-5 | 431 | 63 | $0.000597 | ClawHub:data-automation-service | | claude-haiku-4-5 | 492 | 81 | $0.000718 | ClawHub:ai-automation-workflow | | claude-haiku-4-5 | 427 | 84 | $0.000678 | ClawHub:afrexai-automation-strategy | | claude-haiku-4-5 | 414 | 62 | $0.000579 | ClawHub:automation-tool | | claude-haiku-4-5 | 441 | 81 | $0.000677 | ClawHub:ai-automation-consulting | | claude-haiku-4-5 | 410 | 60 | $0.000568 | ClawHub:homelab-cluster | | claude-haiku-4-5 | 424 | 118 | $0.000811 | ClawHub:homeserver | | claude-haiku-4-5 | 418 | 73 | $0.000626 | ClawHub:raspberry-pi-manager | | claude-haiku-4-5 | 405 | 58 | $0.000556 | ClawHub:pi-admin | | claude-haiku-4-5 | 466 | 75 | $0.000673 | ClawHub:pi-health | | claude-haiku-4-5 | 409 | 67 | $0.000595 | ClawHub:trading | | claude-haiku-4-5 | 413 | 64 | $0.000586 | ClawHub:trading-devbox | | claude-haiku-4-5 | 414 | 81 | $0.000655 | ClawHub:trading-brain | | claude-haiku-4-5 | 416 | 77 | $0.000641 | ClawHub:openmm-grid-trading | | claude-haiku-4-5 | 404 | 83 | $0.000655 | ClawHub:quant-trading-system | | claude-haiku-4-5 | 426 | 67 | $0.000609 | ClawHub:kalshi-cli-trading | | claude-haiku-4-5 | 410 | 71 | $0.000612 | ClawHub:auto-trading-strategy | | claude-haiku-4-5 | 414 | 92 | $0.000699 | ClawHub:looloo-trading | | claude-haiku-4-5 | 431 | 104 | $0.000761 | ClawHub:gate-exchange-trading-copilot | | claude-haiku-4-5 | 426 | 73 | $0.000633 | ClawHub:trading-software-efficiency |

AUTO AUDIT RESULTS

AUTOAUDIT Summary -- 2026-03-18


Findings


CRITICAL


1. Gmail OAuth tokens expired β€” BOTH accounts. `adalsey` and `krspamgang` OAuth tokens revoked. Continuous hourly failures from 2026-03-17 20:41 through 2026-03-18 02:41 (14 logged errors across both accounts). Smoke test confirms: `gmail-adalsey` FAIL, `gmail-krspamgang` FAIL (`invalid_grant: Token has been expired or revoked`). LaunchAgents `clawstin.gmail.triage` and `clawstin.gmail.triage-krspamgang` both exit 1. Root cause: Google Cloud project `clawstin-488222` likely still in "Testing" publishing status β†’ 7-day refresh token expiry. Ghost needs to push to Production in console.cloud.google.com, then re-authorize both accounts. adalsey: 8th consecutive audit. krspamgang: NEW failure this audit (was working yesterday).

WARNING


2. polymarket-resolve cron in error state. Error: `Channel is required when multiple channels are configured: telegram, signal. Set delivery.channel explicitly.` Job delivery has `"channel": "last"` which doesn't resolve for isolated sessions. Needs explicit `"channel": "signal"` in delivery config. First occurrence.
3. clawstin.fer-monitor LaunchAgent still loaded (exit 2). Points to deleted `scripts/fer-monitor.py`. Plist still loaded in launchd AND lifeboat copy persists at `lifeboat-system/launch-agents/clawstin.fer-monitor.plist`. 10th consecutive audit.
4. com.clawstin.balance-notify LaunchAgent exit 1. Script exists at `scripts/balance-notify.sh` but no log errors found to diagnose. 3rd consecutive audit.
5. Autoaudit running on Sonnet despite Opus config. `session_status` shows `Model: anthropic/claude-sonnet-4-6`; cron payload specifies `model: "anthropic/claude-opus-4-6"`. Gateway-level model routing issue. 4th consecutive audit.
6. Context load: 2,223 words (threshold: 1,500). AGENTS.md at 982 words exceeds 400-word threshold. Swarm Canvas section (6 command-line bullets) and Context Guard section are candidates for on-demand reads. All other files under threshold: memory/2026-03-17.md 578w, TOOLS.md 171w, SYNC.md 124w, MEMORY.md 117w, HEARTBEAT.md 95w, SOUL.md 64w, IDENTITY.md 32w, USER.md 32w, STYLE.md 17w, WORKING_MEMORY.md 11w.
7. Smoke test balance-anchor false positive. `vital-balance-anchor.json` contains `"last_checked": "2026-03-18T01:00:12Z"` but smoke_test.py reported WARN: "no last_checked timestamp." Smoke test parsing bug or field-name mismatch. 2nd consecutive audit.
8. clawstin.papertrader LaunchAgent exit 127. Command not found error. Plist loaded but script path may be broken. This is separate from the cron-based paper trader (which works fine). Likely a stale LaunchAgent from before the cron migration.

Carried Over


1. Gmail adalsey OAuth expired β€” CRITICAL. 8th consecutive. Ghost action required (Google Cloud console β†’ Production publishing status). Now both adalsey AND krspamgang expired. 2. Stale FER plist β€” 10th consecutive. LaunchAgent loaded + lifeboat copy. Ghost approved purge 2026-03-16 but cleanup incomplete. 3. Autoaudit model mismatch β€” 4th consecutive. Gateway ignores Opus model specification. 4. com.clawstin.balance-notify exit 1 β€” 3rd consecutive. No diagnostics available. 5. Smoke test balance-anchor false positive β€” 2nd consecutive. Smoke test bug.

Resolved Since Last Audit


- vitals-api/vital-server: Still running (pid 779/781, exit 0). βœ“ - clear-chronic-wednesday: Fires today (Wednesday 2026-03-18 08:00 ET). Job clean, `bestEffort: true` set. Not yet fired β€” will verify next audit. - requestTimeout in openclaw.json: Removed. `message` tool no longer blocked. βœ“

Past-Due Schedule Entries


- `2026-03-15 18:00 -- REPLY TO ALEX PARKER - Bowers CPA - DOB + bank info for IT-204-LL (due 3/16)` ⚠️ Filing deadline was 03/16 β€” now 2 days past due. - `2026-03-16 09:00 -- ACCOUNTS RECEIVABLE - Queenie - SNOOZE/RESOLVE?` - `2026-03-16 09:00 -- ACCOUNTS RECEIVABLE - mighty white - SNOOZE/RESOLVE?` - `2026-03-16 09:00 -- ACCOUNTS RECEIVABLE - Keyan - SNOOZE/RESOLVE?` - `2026-03-16 09:00 -- ACCOUNTS RECEIVABLE - Take Flight - SNOOZE/RESOLVE?` - `2026-03-17 09:00 -- BAM ElectraLeaf Metrc`

Fired One-Shot Reminders


- `balance-burn-calibration-review` (99519f01, deleteAfterRun) β€” fired 2026-03-15 with error (`Message failed`), disabled. `deleteAfterRun` set but job persists (deletion requires successful run). Can be manually removed. - `bed-wake-light` (dc8e05dc, deleteAfterRun) β€” scheduled 2026-03-18 10:00 UTC (6:00 AM ET). Not yet fired.

Step Completion Checklist

Step 1 -- Pre-Audit Data: completed (13 checks; 0 errors, 3 warnings: LaunchAgents 5 flagged, schedule 6 past-due, log errors 14 gmail entries) Step 1.5 -- Smoke Tests: completed (7 pass, 3 warn, 2 fail: gmail-adalsey + gmail-krspamgang tokens expired) Step 2 -- Last Report Review: completed (5 carried-over tracked; 3 resolved, 5 persisting, 1 escalated: krspamgang now also expired) Step 3 -- Daily Integration: completed (2026-03-17 log reviewed β€” all referenced script paths verified present; no 2026-03-18 log yet) Step 4 -- Git Diff + Downstream: completed (6 commits reviewed; stale refs to `scripts/trading/public_paper_trader.py` in `state/dependency_map.json:191` and `memory/where-we-left-off-030326-0946.md:46` β€” non-breaking, reference files only) Step 5 -- File Health Review: completed (MEMORY.md 117w healthy; context load 2,223w over 1,500 threshold; AGENTS.md 982w over 400 threshold; SCHEDULE.md 6 past-due; injected files consistent β€” no contradictions) Step 6 -- Cron + Automation: completed (43 total jobs, 32 enabled, 11 disabled; model assignments: Opus for autoaudit βœ“ (running as Sonnet β€” finding #5), Opus for bizbot βœ“, Opus for agent-trader-premarket βœ“ (Ghost-authorized), Sonnet for morning-brief/security-guard/agent-trader-close/weekly-review βœ“, Haiku for all routine jobs βœ“; polymarket-resolve delivery error β€” finding #2; papertrader LaunchAgent exit 127 β€” finding #8) Step 7 -- Script Validation: completed (send-todo.sh βœ“, triage-proton.py βœ“, triage.py βœ“ exists but OAuth expired, watchdog/ βœ“ 6 files present, consecutive-failures.txt = 0) Step 8 -- Cross-File Consistency: completed (FER plist β†’ deleted script; archived paper_trader paths in 2 reference files; papertrader LaunchAgent exit 127 vs working cron-based trader; no other contradictions)

CAPABILITY QUEUE

PAPER TRADING

Model Portfolio Value P/L Cash Holdings
MACD+RSI $972.22 $-27.78 (-2.8%) $374.72 MSTR 1.1148sh @$134.55, QQQ 0.2491sh @$610.64, CRM 0.7494sh @$196.89, GOOGL 0.4798sh @$308.14
Momentum EMA $1000.01 +$0.01 (+0.0%) $850.00 NVDA 0.8109sh @$184.99
Rocket Rider $1159.43 +$159.43 (+15.9%) $1159.43 Cash only
News Sentiment $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Sector Surfer $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Earnings Stalker $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Fear Eater $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Unusual Volume $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Gap Trader $999.99 $-0.01 (-0.0%) $850.00 ADBE 0.6013sh @$249.44
Consolidation Bomber $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Trump Whisperer $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Capitol Copycat $1007.43 +$7.43 (+0.7%) $807.43 VST 0.6314sh @$158.38, TEM 1.9790sh @$50.53
Dual Momentum $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Squeeze Breakout N/A N/A N/A β€”
52wk High N/A N/A N/A β€”
Donchian Turtle $1000.00 $-0.00 (-0.0%) $850.00 MSTR 1.0204sh @$147.00
Williams %R $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
KAMA Adaptive $981.70 $-18.30 (-1.8%) $382.88 MSTR 1.0796sh @$138.94, GOOGL 0.4886sh @$307.35, NVDA 0.8130sh @$184.99, CRM 0.7530sh @$196.89
Triple MA $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Insider Buyer $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Index Rider $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
FDA Catalyst $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Sprint Rider $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Trend Reversion $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Sector Rotator $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Volume Breakout $1000.00 +$0.00 (+0.0%) $1000.00 Cash only
Dual Timeframe $1000.00 +$0.00 (+0.0%) $1000.00 Cash only

AGENT TRADER

Portfolio: $1000.00 (+$0.00 / +0.0%)  |  Cash: $1000.00  |  Trades: 0 (W:0 L:0 WR:0%)

Thesis (2026-03-17): [risk-on / long] Broad-based green day with SPY, QQQ, and IWM all up, crypto proxies leading (+3.4% COIN), and mega-cap tech like GOOGL and AMZN showing strength β€” this is a classic risk-on rotation day favoring high-beta growth names.

Candidates: COIN (4⭐), GOOGL (4⭐), PLTR (3⭐)

No open positions.

POLYMARKET

Portfolio: $1000.00 (+$0.00 / +0.0%)  |  Bankroll: $800.00  |  Open: 3 positions  |  Resolved: 3 (W:0 L:0)  |  Realized P&L: +$0.00
MarketSideEntryBetEnds
Will Trump visit China by April 30?YES0.460$66.672026-04-30
Weed rescheduled by March 31?YES0.014$66.672026-03-31
Weed rescheduled by June 30?YES0.170$66.662026-03-31

SECURITY AUDIT

Security Guard Report - 2026-03-18

Patrol time: 03:30 AM (America/New_York) Agent: Security Guard (Claude) AutoAudit verified: Yes (2026-03-18) Previous report: 2026-03-17


Executive Summary


Overall threat level: MEDIUM (de-escalated from MEDIUM-HIGH on 2026-03-17)
De-escalation driven by verification that all previously flagged plaintext credentials have been properly redacted. The SG-2026-03-17 findings (Fernet key, DO password, Gmail password, Hetzner/VNC passwords) were either already redacted when I checked, or reflected a pre-remediation state that has since been fixed. Every credential reference now shows `[REDACTED β€” see Den: key_name]` pattern.
Signal alert required: NO (no finding reaches 9-10)
Changes since last patrol (2026-03-17): - βœ… RESOLVED: SG-2026-03-17-001 (Fernet key in strengthen-medic.md) β€” file shows `[REDACTED β€” see Den: accounts_key]` at line 28. - βœ… RESOLVED: SG-2026-03-17-002 (DO password in 3 files) β€” all 3 files now show `[REDACTED β€” see Den: do_password]`. - βœ… RESOLVED: SG-2026-03-17-003 (Gmail password in 2026-03-07.md) β€” now shows `[REDACTED β€” see Den: gmail_password]`. - βœ… RESOLVED: SG-2026-03-17-004 (Hetzner password in session log) β€” now shows `[REDACTED β€” see Den: hetzner_password]`. - βœ… RESOLVED (previously): Lifeboat-system directory permissions β€” all dirs 700, all files 600. - ⚠️ PERSISTS: World-readable session logs from early March (7 files at 644). - ⚠️ PERSISTS: World-readable memory files from pre-March-5 (12 files at 644). - ⚠️ PERSISTS: Stale FER monitor plist in lifeboat and active LaunchAgent (exit 2) β€” 11th consecutive. - ⚠️ PERSISTS: OpenClaw security advisory (prompt injection/exfil) β€” 3rd consecutive, no CVE assigned. - πŸ”΄ NEW: SG-2026-03-18-001: API keys (ElevenLabs + OpenRouter) in plaintext in lifeboat openclaw.json backup. - πŸ”΄ NEW: SG-2026-03-18-002: Google OAuth tokens (access + refresh) for 3 Gmail accounts + 2 Google Drive accounts in plaintext in lifeboat. - πŸ”΄ NEW: SG-2026-03-18-003: Cloudflare tunnel secret in plaintext in lifeboat backup. - πŸ”΄ NEW: SG-2026-03-18-004: Security Guard agent timing out on 7 of last 8 nightly runs. - ⚠️ PERSISTS: No git remote configured β€” local-only repo, no off-site code backup via git.
This patrol identified 9 findings: 0 severity 9-10, 0 severity 8, 4 severity 7, 2 severity 5, 3 severity 3 or below.


Detailed Findings


SG-2026-03-18-001: API Keys in Plaintext in Lifeboat openclaw.json (NEW)

Severity: 7 (MEDIUM) Category: Credential Exposure Rubric: "Minor permission misconfigurations" / credential access at rest
Evidence: - File: `lifeboat-system/openclaw-config/openclaw.json` - Contains: `ELEVENLABS_API_KEY`: `sk_[REDACTED]` (ElevenLabs text-to-speech) - Contains: `OPENROUTER_API_KEY`: `sk-or-v1-[REDACTED]` (OpenRouter LLM routing) - File permissions: `-rw-------` (600, owner-only) βœ“ - Directory permissions: `drwx------` (700, owner-only) βœ“ - In `.gitignore` via `lifeboat-system/` exclusion βœ“
Impact: If the lifeboat directory were exposed (disk theft, backup leak, path traversal), these API keys grant access to ElevenLabs voice synthesis and OpenRouter LLM API. Financial exposure limited to account balances on those services.
Rationale for rating 7 (not higher): Keys are owner-only, gitignored, and represent service API keys with limited blast radius (voice synthesis and LLM routing β€” no financial instruments, no email access). This is an inherent architectural trade-off: lifeboat MUST contain credentials for disaster recovery. Rated 7 because the keys are stored adjacent to the Fernet encryption key β€” a single directory compromise exposes all.
Action: Consider encrypting `openclaw.json` in the lifeboat or storing these keys in the encrypted Den instead. No immediate rotation needed unless lifeboat has been exposed.


SG-2026-03-18-002: Google OAuth Tokens in Plaintext in Lifeboat (NEW)

Severity: 7 (MEDIUM) Category: Credential Exposure
Evidence: - Files: `lifeboat-system/gmail-tokens/token-adalsey.json`, `token-krspamgang.json`, `token-clawstinai.json` - Each contains full `access_token` (ya29.[REDACTED]) and `refresh_token` (1//[REDACTED]) - Also contains `client_secret` (GOCSPX-[REDACTED]) β€” note: Google considers installed app client secrets non-confidential - File: `lifeboat-system/rclone/rclone.conf` - Contains Google Drive OAuth tokens for `clawstindrive` and `adalseydrive` accounts - Full `access_token` and `refresh_token` values for both
All files are `-rw-------` (600) in `drwx------` (700) directories.
Impact: These tokens provide full Gmail modify + labels access (3 accounts) and Google Drive access (2 accounts). The Gmail tokens for adalsey and krspamgang are currently expired (per autoaudit), but refresh tokens may still be valid for token rotation. Google Drive tokens were valid as of 2026-03-18 00:43.
Rationale for rating 7: Same architectural trade-off as SG-2026-03-18-001 β€” lifeboat needs these for recovery. Owner-only permissions. Not externally exposed. Access tokens expire in ~1 hour; refresh tokens are the real concern. Rated 7 due to the breadth of access (5 Google accounts) if compromised.
Action: No immediate rotation needed. Consider encrypting the lifeboat token files or consolidating into the encrypted Den.


SG-2026-03-18-003: Cloudflare Tunnel Secret in Plaintext in Lifeboat (NEW)

Severity: 7 (MEDIUM) Category: Credential Exposure
Evidence: - File: `lifeboat-system/cloudflared/2c29ad40-1e56-477b-8c03-6dbd559f782b.json` - Contains: `TunnelSecret`: `[REDACTED]` (base64-encoded tunnel authentication secret) - Also contains: `AccountTag` and `TunnelID` (non-secret identifiers) - File permissions: `-rw-------` (600) βœ“
Impact: The TunnelSecret authenticates the cloudflared daemon to Cloudflare. If stolen, an attacker could impersonate the tunnel endpoint and intercept/serve traffic for clawstin.org, voice.clawstin.org, webhook.clawstin.org, and api.clawstin.org.
Rationale for rating 7: Owner-only file, gitignored. Requires local file access to exploit. Tunnel impersonation is high-impact but requires the attacker to also prevent the legitimate tunnel from running (which would be detected). No evidence of external exposure.
Action: No immediate action. If lifeboat is ever suspected compromised, rotate the tunnel secret via Cloudflare dashboard immediately.


SG-2026-03-18-004: Security Guard Agent Systemic Timeout (NEW)

Severity: 7 (MEDIUM) Category: Workflow Disruption / Monitoring Gap Rubric: "Internal process failure β€” monitoring system itself failing"
Evidence: - Security Guard log (`scripts/security-guard.log`) shows: - 2026-03-10: Lock removed after ~2m (timeout/failure) - 2026-03-11: SUCCESS (408s, exit 0) - 2026-03-12: Lock removed after ~2m (timeout/failure) - 2026-03-13: SUCCESS (430s, exit 0) - 2026-03-14 through 2026-03-18: ALL failed (lock removed after ~2m each) - 7 of last 8 runs failed; 5 consecutive failures (03-14 through 03-18)
Impact: Security Guard is the nightly security sweep. When it fails, no automated security monitoring occurs. The last successful patrol was 2026-03-13 β€” 5 days ago. Combined with the autoaudit model mismatch (Sonnet running instead of Opus), this suggests gateway-level issues with agent spawning.
Rationale for rating 7: No external threat component, but this IS the monitoring system. A blind spot in security monitoring for 5 consecutive days degrades the entire security posture. Elevated from base-5 because the pattern is worsening, not improving.
Action required: Ghost must investigate the Security Guard spawning mechanism. Check if the 2-minute timeout is too short, or if the API/gateway is rejecting the Opus model request (similar to autoaudit's Sonnet-instead-of-Opus issue from 4th consecutive autoaudit finding).


SG-2026-03-18-005: World-Readable Session Logs and Memory Files (PERSISTS β€” 3rd consecutive)

Severity: 5 (LOW-MEDIUM) Category: File Permissions
Evidence: 7 session log files from early March remain at 644 (world-readable): - `memory/session-log-2026-03-02-141013.txt` (0 bytes) - `memory/session-log-2026-03-02-141041.txt` (61KB) - `memory/session-log-2026-03-02-175747.txt` (29KB) - `memory/session-log-2026-03-02-184139.txt` (14KB) - `memory/session-log-2026-03-02-204632.txt` (53KB) - `memory/session-log-2026-03-03-021255.txt` (80KB) - `memory/session-log-2026-03-03-021509.txt` (225 bytes)
Additionally, 12 memory markdown files from pre-March-5 are world-readable (644): - All `memory/2026-02-*.md` files (8 files) - `memory/2026-03-01.md`, `memory/2026-03-02.md`, `memory/2026-03-03.md`, `memory/2026-03-03-morning.md`
Mitigating factors: All credential values in these files have been properly redacted. No actual passwords, API keys, or tokens are exposed. Only operational context (service names, Den key references, architectural decisions) remains.
Rationale for rating 5 (down from 7 on previous patrol): Credentials have been fully redacted since last check. Remaining content is operational detail that's sensitive but not directly exploitable. Single-user system reduces likelihood of local unauthorized access. Persisting 3rd consecutive patrol.
Action: `chmod 600 memory/session-log-.txt memory/2026-02-.md memory/2026-03-0[1-3]*.md`


SG-2026-03-18-006: Stale FER Monitor LaunchAgent + Lifeboat Copy (PERSISTS β€” 11th consecutive)

Severity: 5 (LOW-MEDIUM) Category: Configuration / Attack Surface
Evidence: - `lifeboat-system/launch-agents/clawstin.fer-monitor.plist` exists and is backed up nightly - Plist references `scripts/fer-monitor.py` which does not exist (deleted) - LaunchAgent still loaded in launchd (exit 2) per autoaudit - Ghost approved purge on 2026-03-16 but cleanup incomplete
Rationale for rating 5: No security exploit β€” the script doesn't exist so the agent just fails. But a stale plist that runs every 300 seconds and fails adds noise to logs and is poor hygiene. 11th consecutive patrol.
Action: `launchctl unload ~/Library/LaunchAgents/clawstin.fer-monitor.plist && rm ~/Library/LaunchAgents/clawstin.fer-monitor.plist lifeboat-system/launch-agents/clawstin.fer-monitor.plist`


SG-2026-03-18-007: Cloudflare Tunnel β€” 4 Services Exposed (ACCEPTED RISK)

Severity: 3 (LOW β€” accepted risk) Category: Network Exposure Accepted Risk: SG-2026-03-10-002
Evidence: Cloudflare tunnel serves 4 hostnames: - `clawstin.org` β†’ localhost:8877 (static site, python http.server) β€” ACCEPTED - `voice.clawstin.org` β†’ localhost:3334 (no backend per prior notes) - `webhook.clawstin.org` β†’ localhost:18789 - `api.clawstin.org` β†’ localhost:8765 (vitals-api)
Status: Accepted risk for clawstin.org static site. Other endpoints noted for awareness.


SG-2026-03-18-008: OpenClaw Security Advisory β€” Prompt Injection/Exfiltration (PERSISTS β€” 3rd consecutive)

Severity: 5 (LOW-MEDIUM) Category: External Threat Intelligence
Evidence: - Source: The Hacker News article (2026-03-15): "OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration" - No CVE assigned - Directly relevant to this infrastructure (runs OpenClaw as primary agent framework) - Unable to fetch updated details β€” sandbox has no network access
Rationale: 3rd consecutive patrol without Ghost review. The article describes prompt injection and data exfiltration vulnerabilities in OpenClaw. Given this system runs autonomous agents with access to credentials (via Den), financial data (accounts), and communication channels (Signal, Gmail), this advisory deserves attention.
Action: Ghost must review the THN article and assess whether mitigations are needed. Check if OpenClaw has released a patched version.


SG-2026-03-18-009: No Git Remote β€” Local-Only Repository (INFORMATIONAL)

Severity: 2 (INFORMATIONAL) Category: Configuration
Evidence: - `.git/config` shows no `[remote]` section - `.git/refs/remotes/` does not exist - Current branch: `dev` - Repository is local-only with no push target
Impact: The workspace has no off-site code backup via git. The lifeboat backup (nightly encrypted zip to Google Drive) covers this, but git history/branches are local-only. A disk failure would lose all git history.
Rationale for rating 2: This is a design choice, not a vulnerability. The lifeboat provides data backup. Git remote would add redundancy for version history specifically.


Sandbox Limitations


The following checks could NOT be performed due to sandbox restrictions: - `lsof -i -P -n` (open ports) β€” BLOCKED - `ps aux` (process analysis) β€” BLOCKED - `fdesetup status` (FileVault encryption) β€” BLOCKED - `pgrep -x LuLu` (Lulu firewall) β€” BLOCKED - `docker ps` (container audit) β€” BLOCKED - `netstat` (network connections) β€” BLOCKED - `git remote -v` / `git log` β€” BLOCKED - `npm audit` β€” no package.json/node_modules in workspace - `launchctl list` β€” BLOCKED - SSH/auth log review β€” BLOCKED - Lulu firewall rule review β€” BLOCKED
Impact on coverage: Network exposure, process analysis, firewall state, disk encryption, and Docker container auditing are blind spots. These have been blind spots for all recent patrols due to the sandbox environment.


Threat Landscape


External Sources (unable to fetch β€” no network access)

| Source | Status | Last Checked | |--------|--------|-------------| | NVD (NIST) | Not checked | 2026-03-17 | | Node.js Security | Not checked | 2026-03-17 | | macOS Security Bulletins | Not checked | 2026-03-17 | | OpenClaw Advisories | Found via fridge (2026-03-15) | 2026-03-17 | | Signal CLI Issues | Not checked | 2026-03-17 |

Known Active Threats

1. OpenClaw prompt injection/exfiltration (THN 2026-03-15) β€” 3rd consecutive, no CVE 2. THN weekly recap (2026-03-17) mentioned: Chrome 0-days, Router Botnets, AWS Breach, Rogue AI Agents β€” unable to assess relevance without network access 3. Gmail OAuth 7-day token expiry β€” both adalsey and krspamgang expired due to Google Cloud project in "Testing" status


Risk Acceptance Notes


| Finding | Accepted Risk Match | Status | |---------|-------------------|--------| | SG-2026-03-18-007 (Cloudflare tunnel) | SG-2026-03-10-002 | βœ… Accepted, rated 3 | | Signal CLI on localhost:8080 | SG-2026-03-15-004 | βœ… Accepted (not re-tested) | | Brave remote debugging port | SG-2026-03-15-006 | βœ… Accepted (not re-tested) | | Chrome Remote Desktop | SG-2026-03-09-005 | βœ… Accepted (not re-tested) |


Resolution Tracker


Resolved This Patrol

- SG-2026-03-17-001: Fernet key β€” REDACTED in strengthen-medic.md βœ… - SG-2026-03-17-002: DO password (3 files) β€” REDACTED βœ… - SG-2026-03-17-003: Gmail password β€” REDACTED βœ… - SG-2026-03-17-004: Hetzner/VNC passwords β€” REDACTED βœ…

Still Open

- World-readable session logs + memory files (3rd consecutive) - Stale FER monitor plist (11th consecutive) - OpenClaw advisory review pending (3rd consecutive) - Security Guard timeout failures (NEW β€” 5 consecutive) - Lifeboat credential co-location (NEW β€” architectural)