vispatrol-picture

ReviewAudited by ClawScan on May 6, 2026.

Overview

This appears to be a coherent VisPatrol snapshot tool, but it should only be used on a trusted Windows VisPatrol machine because it uses a local session token and can return camera images.

Install only if you intentionally want OpenClaw to retrieve VisPatrol camera snapshots on this Windows host. Before each run, confirm that reading %TEMP%/vpup.json is acceptable, and give a separate confirmation before any all-device capture. Treat returned images as sensitive and send them only to authorized channels.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If approved, the skill can use the existing local VisPatrol session to query configured camera devices and retrieve snapshots.

Why it was flagged

The skill intentionally relies on a local VisPatrol session token, which is high-impact account/session authority even though it is disclosed and scoped to the stated snapshot purpose.

Skill content
vpup.json 提供服务地址、端口和本地 VisPatrol 会话 token;本技能不要求用户额外输入账号密码。
Recommendation

Enable it only on a trusted Windows VisPatrol host, verify that %TEMP%/vpup.json belongs to that runtime, and approve each run only when you intend to use that local session.

What this means

Camera snapshots could be sent through the user’s chosen output channel, which may be outside the local VisPatrol system.

Why it was flagged

The skill may package snapshot image paths for forwarding through messaging or image-upload channels; this is disclosed and user-directed, but surveillance images are sensitive.

Skill content
当需要把抓拍图片连同文字报告一起发给飞书机器人或其他支持图片上传的渠道时,必须使用 --json。
Recommendation

Only forward images to channels and recipients that are authorized to view the camera snapshots, especially for all-device captures.

What this means

Running the skill may execute a small set of local OS commands for environment discovery.

Why it was flagged

The script can invoke local Windows commands to find the host TEMP directory under WSL. The arguments are fixed and not user-controlled, which keeps this proportionate to the stated purpose.

Skill content
commands = (["cmd.exe", "/d", "/c", "echo", "%TEMP%"], ...); completed = subprocess.run(command, ...)
Recommendation

Keep this restricted to trusted Windows/WSL environments and do not modify the script to accept arbitrary shell input.

What this means

Installation could pick up whatever current versions are available from the configured pip index.

Why it was flagged

The skill depends on external Python packages installed from pip without pinned versions. These are common libraries and purpose-aligned, but package provenance/version control is not locked down.

Skill content
pip install requests
pip install pycryptodome
Recommendation

Install dependencies from a trusted package index and consider pinning known-good versions in controlled deployments.