Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
WSL Windows Bridge
v0.2.0WSL ↔ Windows cross-system bridge for OpenClaw agents. Provides win-python / win-ps / win-cmd / win-copy / win-run-py / win-path to invoke Windows Python (An...
⭐ 0· 20·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill claims six wrapper commands (win-python, win-ps, win-cmd, win-copy, win-run-py, win-path) and documents them in SKILL.md/README, but the distributed package only contains two script files (setup.sh and env.windows.sh). The actual wrapper executables (win-*) are not present in the file listing. setup.sh attempts to copy scripts named win-* from the scripts directory; if those wrappers are absent the advertised functionality will not be installed. This is an inconsistency between claimed capabilities and included files.
Instruction Scope
Instructions are explicit and limited to installing wrappers into ~/.openclaw/bin, generating an env file, and verifying installed wrappers. The setup flow is interactive (read -p) and the README notes non-interactive exec considerations. The instructions will source env files and then invoke win-* wrappers; because wrappers are missing, verification may fail. The instructions also enable cross-system execution of Windows commands (PowerShell/CMD) and filesystem access — that behavior is coherent with the stated purpose but is powerful: any wrapper that executes user-supplied commands can run arbitrary Windows code and access Windows files. The wrappers themselves are not provided for review, which prevents a full scope assessment.
Install Mechanism
No external downloads or remote installs; installation is local copying into the user's home directory (~/.openclaw). setup.sh creates directories and writes an env file under the user's home. This is a low-risk install mechanism in terms of supply-chain downloads.
Credentials
The skill does not request credentials or unusual environment access. It defines environment variables for WIN_* paths (WIN_ROOT, WIN_PYTHON, WIN_PS, etc.) which are appropriate for a WSL↔Windows bridge. No unrelated secrets or external service keys are requested.
Persistence & Privilege
The skill does not request 'always' inclusion and does not modify system-wide settings beyond writing files under the installing user's ~/.openclaw/ directory. However, because the functionality bridges into Windows and allows executing Windows commands, granting the skill autonomous invocation (the platform default) would increase risk: an autonomous agent could execute Windows processes and read/write Windows files. This is a contextual caution, not a direct misconfiguration in the package.
What to consider before installing
Do not run setup.sh or install this skill until you verify the missing wrapper scripts. Request the actual win-* wrapper scripts (win-python, win-ps, win-cmd, win-copy, win-run-py, win-path) and review their contents: they will be the components that invoke Windows executables and could execute arbitrary commands or move files. Confirm that the wrappers only do what you expect (path conversion, controlled command invocation) and do not phone home or exfiltrate data. If you proceed: run setup.sh manually in an interactive shell (so you can answer prompts), inspect the generated ~/.openclaw/env.windows.sh before sourcing it, and avoid running it with elevated privileges. Finally, consider the risk that enabling an LLM agent to use this bridge grants it the ability to run Windows processes and access Windows files — only enable autonomous invocation for trusted agents and after reviewing the wrapper code.Like a lobster shell, security has layers — review code before you run it.
latestvk979dxdwrgpemsnczep6tbgpzs8481an
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🪟 Clawdis
Binsbash, wslpath, powershell.exe, cmd.exe
