Home Assistant Master
v1.0.3Home Assistant OS (HAOS) operations skill for OpenClaw agents. Use for read-only audits, diagnostics, automation design/review, dashboard UX planning, voice...
MIT-0
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (HAOS operations, audits, diagnostics, automation design) match the SKILL.md and reference docs. The skill requests no unrelated binaries, env vars, or configs; it explicitly expects platform-provided runtime access (connector/browser relay/token), which is appropriate for this purpose.
Instruction Scope
Runtime instructions stay on-purpose: emphasize read-only diagnostics, evidence collection (states/history/logs/traces) and only perform writes after explicit multi-step confirmation. The SKILL.md lists allowed vs blocked actions and tiered risk controls; reading potentially sensitive logs is expected for diagnostics and is explicitly constrained by the policy.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is downloaded or written to disk by the skill itself, minimizing installation risk.
Credentials
Skill declares no required environment variables or credentials. It documents acceptable runtime access methods and credential handling policies (avoid pasting long-lived secrets, use secret storage), which is proportional to its needs. The platform/host will supply any needed tokens; users should ensure least-privilege tokens are used.
Persistence & Privilege
always:false (default) and no persistent install behavior. disable-model-invocation is false (agent may invoke autonomously) — this is the platform default and not combined with other red flags in this skill.
Assessment
This skill appears coherent and conservative, but it requires the hosting platform to provide access to your Home Assistant instance. Before installing or enabling it: (1) verify the hosting agent/connector is trusted and inspect its connector implementation if possible; (2) do not paste long-lived tokens into chat—use the platform's secret storage or short-lived, least-privilege tokens (read-only tokens for audits); (3) require explicit confirmation for any write actions and prefer two-step confirmation for sensitive changes; (4) audit agent activity and logs after first runs to ensure no unexpected data exfiltration; (5) if you need stronger guarantees, restrict the agent to read-only access or review the platform's permission model before granting runtime write capabilities.Like a lobster shell, security has layers — review code before you run it.
latest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
SKILL.md
Home Assistant Master
Follow a diagnostics-first, safety-first workflow for HAOS.
Core operating policy
- Start read-only (state/history/logs/traces/diagnostics).
- Confirm runtime access path and credential handling policy before operational guidance.
- Preview exact impact before any write.
- Ask explicit confirmation before writes.
- Verify outcome and summarize results.
Risk controls
- Tier 0: read-only (safe by default).
- Tier 1: low-risk writes (lights/helpers/scenes/scripts).
- Tier 2: sensitive writes (locks/alarms/garage/cameras/access).
- Tier 3: platform actions (restart/reload/update/restore).
- Require two-step confirmation for Tier 2/3.
Execution workflow
- Clarify user intent + constraints.
- Collect evidence (trace/history/logs/integration state).
- Diagnose root cause (or design options if planning).
- Return smallest safe next step first.
- Expand only if user asks (checklist -> deep dive).
Reference map (load only when needed)
references/safety-policy.mdreferences/workflows.mdreferences/checklists.mdreferences/citations.mdreferences/model-codex.mdreferences/model-claude.mdreferences/release-watch.mdreferences/home-agent-profile.mdreferences/access-and-credentials.md
Allowed actions (default)
- Read-only diagnostics: states, history, traces, logs, integration health.
- Planning outputs: checklists, decision trees, change previews.
- Low-risk guidance for dashboards/automations/helpers without executing writes.
Blocked actions (without explicit approval)
- Any write/reload/restart/update/restore action.
- Any lock/alarm/camera/access-control changes.
- Any bulk entity/service mutation beyond explicitly scoped targets.
- Any instruction to reveal or move secrets/tokens.
Hard constraints
- Never execute destructive/mass changes without explicit scoped approval.
- Never disable security controls as a shortcut.
- Prefer official HA docs when guidance conflicts.
Files
10 totalSelect a file
Select a file to preview.
Comments
Loading comments…
