Desktop Sandbox
v1.1.1A desktop sandbox lets OpenClaw run as natively as on a real OS, ensuring full functionality with safe isolation.Run OpenClaw without breaking your PC.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name and description claim to install a desktop sandbox. The code and SKILL.md implement a downloader/installer that fetches GitHub releases from the specified repo and runs the .pkg on macOS or .exe on Windows. Requiring node is appropriate for the provided Node script.
Instruction Scope
Instructions are narrow and explicit: run node scripts/run_installer.js (optionally with --version). The installer script downloads release assets from GitHub and executes them. This is in-scope for an installer, but the runtime will download arbitrary binaries from the repo's releases and execute them (including installing into system locations), which is a high-impact action that users should consciously approve.
Install Mechanism
There is no packaged install spec; the skill is instruction + embedded Node script. The script uses the GitHub API to find release assets and downloads them directly (via HTTPS) before running installers. Using GitHub releases is a reasonable source, but downloading and executing release assets is moderate risk compared with an instruction-only skill because it writes and executes binaries on the host.
Credentials
The skill only requires the node binary and does not request credentials, environment variables, or config paths. The script does not appear to read unrelated environment variables or sensitive files in the provided portion of the code.
Persistence & Privilege
The skill does not request permanent presence (always:false) and does not modify other skills. However, it attempts to run OS installers that may write to system directories (e.g., Program Files / root), which can trigger elevation prompts or require administrative privileges. That is expected for an installer but increases the potential impact if the upstream installer is untrusted.
Assessment
This skill will download a platform installer from the GitHub releases of AtlasCore-tech/desktop-sandbox-openclaw and execute it on your machine. That behavior matches its stated purpose but has real risk because installers run with system impact. Before using it: (1) verify the upstream GitHub repo and its maintainer are trustworthy, (2) inspect the release assets and checksums on the repo yourself (or ask for signed releases), (3) run the installer in a disposable/test environment first, (4) avoid granting admin privileges unless you trust the binary, and (5) if you need higher assurance, provide the full, untruncated script for code review and confirm there are no hidden network callbacks or telemetry endpoints beyond GitHub releases.Like a lobster shell, security has layers — review code before you run it.
Runtime requirements
📦 Clawdis
Binsnode
latest
Desktop Sandbox Installer
Install AtlasCore Desktop Sandbox from GitHub releases.
Script
node scripts/run_installer.js [--version=v1.0]
Parameters
| Parameter | Description |
|---|---|
--version | Specific version (default: latest) |
Platform Behavior
| Platform | Installer | Target |
|---|---|---|
| Windows | .exe → /S /D=C:\Program Files\ | C:\Program Files\ |
| macOS | .pkg → open -W | / |
Exit Codes
| Code | Meaning |
|---|---|
| 0 | Success |
| 1 | Installation failed |
| 999 | Fatal error |
OpenClaw Conversation Usage
In conversation, simply say:
- "Install AtlasCore desktop sandbox"
- "Install desktop sandbox"
- "Download and install AtlasCore sandbox"
Comments
Loading comments...
