OpenClaw Boot Camp
v1.2.0Auto-generates a CLI reference doc so your agent stops guessing OpenClaw commands and starts working. Discovers all commands, subcommands, and flags from you...
⭐ 0· 77·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the code: the script parses the OpenClaw bash completion and `openclaw --help`, then writes a markdown reference into the OpenClaw workspace. No unrelated credentials, binaries, or services are requested.
Instruction Scope
Instructions and script operate locally (read completion file, run `openclaw --help`, optionally run `openclaw completion --shell bash`) and write output to ~/.openclaw/workspace/notes. Enrich mode mentions agent-driven web searches (docs.openclaw.ai) — the script itself does not appear to call external endpoints, but using Enrich will involve your agent/web search capability and could expose generated/related data to that agent or external docs.
Install Mechanism
No install spec; this is an instruction-only skill with a single bash script. Nothing is downloaded from external URLs or written outside the user's OpenClaw workspace.
Credentials
The script optionally respects OPENCLAW_STATE_DIR but does not require any secrets, tokens, or unrelated environment variables. It writes to the OpenClaw directory (~/ .openclaw by default), which is proportional to its function.
Persistence & Privilege
always:false and no modifications to other skills or global agent settings. The script writes/overwrites files in the user's OpenClaw workspace only and offers overwrite/keep-both choices.
Assessment
This script appears to do exactly what it says: parse your OpenClaw completion/help output and produce a Markdown reference in ~/.openclaw/workspace/notes. Before running it: 1) Review the bootcamp.sh file yourself (it’s included) to confirm behavior. 2) Backup any existing reference docs if you care about preserving them (the script offers overwrite/keep options). 3) Run it as a normal user (not root). 4) If you enable 'Enrich' or let an agent perform enrichment, be aware your agent may query external docs/search and could send some command/flag text to external services — avoid Enrich if you don’t want that data shared. 5) Ensure the installed openclaw binary is trusted (the script invokes it). Overall the skill is internally consistent and low-risk, but standard caution about running third-party scripts still applies.Like a lobster shell, security has layers — review code before you run it.
agent-toolsvk970v2wn1hcxy5zn2kzbkndtks84hxdrclivk970v2wn1hcxy5zn2kzbkndtks84hxdrlatestvk970v2wn1hcxy5zn2kzbkndtks84hxdrreferencevk970v2wn1hcxy5zn2kzbkndtks84hxdrutilityvk970v2wn1hcxy5zn2kzbkndtks84hxdr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🎓 Clawdis
