Zellij Terminal Workspace
v1.0.1Remote-control zellij sessions for interactive CLIs by sending keystrokes and scraping pane output.
⭐ 1· 2k·1 current·1 all-time
by@jivvei
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name/description (remote-control zellij sessions) aligns with the included scripts and SKILL.md examples. All code and instructions are about listing sessions, sending keystrokes, piping pane output, waiting for text, and cleaning up sessions — functionality expected for a zellij control skill.
Instruction Scope
SKILL.md and the helper scripts instruct the agent to run local zellij/jq commands and operate on a configurable data directory. They do not instruct reading unrelated system files, calling external network endpoints, or exfiltrating data. The instructions do encourage launching arbitrary commands inside panes (e.g., running coding agents), which is consistent with the purpose but means the operator should avoid running untrusted code in those panes.
Install Mechanism
There is no install spec in the registry (instruction-only skill), and included scripts are small, local bash utilities. SKILL.md metadata suggests installing zellij via brew/cargo, but the skill itself does not download or execute remote artifacts. No high-risk download URLs or archive extraction were found.
Credentials
The registry 'Requirements' section lists no required env vars or binaries, but SKILL.md (metadata and instructions) and the scripts clearly require zellij and jq on PATH and reference an optional CLAWDBOT_ZELLIJ_DATA_DIR env var (defaulting to TMPDIR). This is a documentation/metadata inconsistency but not a harmful credential request: no secrets or unrelated credentials are required.
Persistence & Privilege
The skill does not request persistent/always-on presence and does not modify other skills or system-wide agent settings. It runs only local commands against the zellij data dir and sessions; autonomous invocation is allowed by default but is not combined with other concerning privileges.
Assessment
This skill appears to do what it says: control zellij sessions and scrape pane output. Before installing, ensure you have zellij and jq installed (SKILL.md expects both). Confirm where CLAWDBOT_ZELLIJ_DATA_DIR will point (default is ${TMPDIR:-/tmp}/moltbot-zellij-data) — the scripts operate on that directory and will list/delete sessions there. Be cautious when launching or automating commands inside panes (the examples run coding agents and arbitrary shell commands): those commands run with your account privileges and can modify files or exfiltrate data if untrusted. Note the minor metadata mismatch: the registry lists no requirements while SKILL.md expects zellij and jq — this is likely documentation drift, not a security problem, but you may want to verify requirements before use.Like a lobster shell, security has layers — review code before you run it.
latestvk973bv8078xrd2ep49e12a06mx8046qyterminalvk973bv8078xrd2ep49e12a06mx8046qytmux-alternativevk973bv8078xrd2ep49e12a06mx8046qyttyvk973bv8078xrd2ep49e12a06mx8046qy
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
