CAD Agent
v1.0.0Send build123d CAD commands via HTTP to render images, allowing visual iteration on 3D models entirely within a containerized CAD environment.
⭐ 4· 3k·15 current·16 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The SKILL.md describes a CAD rendering server that accepts build123d code over HTTP and returns renders; that matches the name. However, the manifest declares no required binaries or environment variables even though the runtime instructions require git, docker/docker-compose, network access, and a local port. The omission of these required host capabilities in the manifest is an inconsistency.
Instruction Scope
Runtime instructions tell the agent (or operator) to clone a GitHub repo, build a Docker image, run the container, and then send arbitrary build123d Python code to endpoints. Executing arbitrary code inside the container is expected for a CAD runner, but the instructions also encourage running host docker commands (docker run, docker exec) which may require privileged access and can be risky if the image or Dockerfile is untrusted. The SKILL.md also asserts 'never do STL manipulation outside the container' but gives no technical enforcement mechanism—this is guidance only.
Install Mechanism
There is no formal install spec in the manifest (instruction-only). The SKILL.md directs cloning from GitHub (a well-known host) and building a local Docker image. Cloning and building from a third-party repo is a moderate risk: the source should be reviewed (Dockerfile, entrypoint, scripts) before building or running. No opaque or shortened download URLs are used.
Credentials
The skill requests no environment variables or credentials in the manifest, which is consistent with a local/offline CAD container use-case. There are no unexpected credential demands listed. That said, the SKILL.md assumes the operator can bind ports and run Docker, which are host privileges rather than environment variables.
Persistence & Privilege
always is false and the skill is user-invocable and may be invoked autonomously (default). The skill does not request permanent platform-wide presence or claim to modify other skills' configs. The main privilege implication is that running Docker commands grants the container host-level capabilities depending on how Docker is used—this is an operational risk rather than a manifest privilege flag.
What to consider before installing
This skill appears to implement a local CAD render server and expects you to build and run a container from a GitHub repo. Before installing:
- Review the repository (especially Dockerfile, entrypoint, and any scripts) to see what the image will run and whether it mounts the Docker socket or host paths.
- Verify you have git and Docker/docker-compose available on the host; the manifest does not list these but the README requires them.
- Treat the container as running untrusted code: run it with least privilege, avoid mounting sensitive host paths, and avoid exposing the Docker socket to the container.
- Understand that the server will execute arbitrary build123d Python you send to it; limit who/what can send code and inspect the server code to ensure it restricts filesystem/network access as appropriate.
- If you plan to export or 3D print parts, validate exported files before use and ensure no sensitive data is written out inadvertently.
If you want a lower-risk option, request a vetted prebuilt image from a trusted publisher or ask the author for a security review of the Dockerfile and entrypoint.Like a lobster shell, security has layers — review code before you run it.
latestvk97djyj634akwqsmm2rk0khb817zy247
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
