Tee Tool
PassAudited by VirusTotal on May 5, 2026.
Overview
Type: OpenClaw Skill Name: tee-tool Version: 1.0.0 The skill provides a basic Python implementation of the Unix 'tee' utility in scripts/tee.py, allowing data to be written to a file and stdout simultaneously. While the script lacks the command-line flag support (-a, -i) mentioned in SKILL.md, it performs its stated function without any indicators of malicious intent, data exfiltration, or unauthorized execution.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Using the tool on an existing file can replace that file's contents.
The script writes stdin to a local file using overwrite mode. This is expected for a tee-like utility, but users should notice that existing files can be overwritten and that a default 'out.txt' is used if no argument is supplied.
with open(sys.argv[1] if len(sys.argv)>1 else 'out.txt','w') as f: f.write(text)
Use explicit, intended file paths and keep backups or use a known-safe tee implementation when preserving existing contents matters.
A user may expect append or multiple-file behavior that the included script does not provide.
The documentation advertises append and multi-file tee behavior, while the included script does not parse options and writes only one target in overwrite mode. This looks like an implementation/documentation mismatch rather than hidden malicious behavior.
- `-a`: Append to files instead of overwriting
Do not rely on the documented options unless the installed command is separately verified to support them.
