Flipper Zero
v1.0.0Control Flipper Zero hardware via USB serial or BLE for SubGHz, IR, NFC, GPIO, file system, screen capture, and input without Android or intermediary apps.
⭐ 0· 103·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the included scripts (USB CLI, BLE protobuf, screen/input, SubGHz-over-BLE). Required runtime pieces (pyserial, bleak, protobuf, Pillow) and the protobuf definitions are consistent with implementing the claimed transports and features.
Instruction Scope
SKILL.md and scripts instruct the agent to access local serial/BLE devices and the Flipper filesystem, capture screens to /tmp, upload local files, and perform operations like SubGHz transmit, BadUSB execution, file deletion, power/reboot. These are within the skill's stated goal but are high-risk actions that require explicit user authorization and legal awareness.
Install Mechanism
No automated install spec is provided (instruction-only). The README tells users to create a Python venv and pip-install common packages from PyPI — an expected, low-risk approach. No downloads from untrusted URLs or archive extraction are present.
Credentials
Only lightweight environment overrides are used (FLIPPER_PORT, FLIPPER_BAUD, FLIPPER_BLE_ADDRESS, FLIPPER_BLE_NAME). No unrelated credentials, secrets, or system config paths are requested.
Persistence & Privilege
The skill is not always-enabled and does not request persistent platform privileges or modify other skills. It runs as invoked and operates on local hardware only.
Assessment
This skill appears to do exactly what it claims: direct control of a Flipper Zero over USB or BLE. Before installing or running it, be aware that many supported actions are inherently risky or legally sensitive (radio transmissions, NFC/RFID emulation, BadUSB scripts, deleting device files, rebooting/powering off). Only run these scripts when you control the hardware and have authorization to transmit or emulate devices in your jurisdiction. Inspect the included Python files if you want to confirm no unexpected network endpoints are added (the code shown uses BLE/serial and local file I/O only). When installing, use a dedicated virtual environment, install packages from official PyPI, and avoid giving the skill any unrelated credentials or broad system access.Like a lobster shell, security has layers — review code before you run it.
latestvk979c4tzh5f0kwpyrj07epvd5183frq7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
