MAC OS screenshot to telegram

PassAudited by ClawScan on May 10, 2026.

Overview

The skill does what it says—captures the macOS screen and sends it to Telegram—but users should treat it as sensitive because it uses a bot token and can expose anything visible on screen.

Install only if you intentionally want OpenClaw to capture your macOS screen and send it to Telegram. Before using it, confirm the chat ID and profile, make sure nothing sensitive is visible, protect the Telegram bot token, and remove the saved workspace screenshot if needed.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken invocation or wrong chat ID could send the screenshot outside the local machine.

Why it was flagged

The skill intentionally uses direct shell/API commands to send media instead of a higher-level OpenClaw message tool. This is disclosed and purpose-aligned, but users should recognize it as a direct external upload path.

Skill content
Always use curl with Telegram Bot API directly for reliable media delivery
Recommendation

Only run it after confirming the intended Telegram chat ID and that the current screen is safe to share.

What this means

Anyone who can use the token can act through that Telegram bot, including sending messages or photos permitted by the bot.

Why it was flagged

The script reads a Telegram bot token from the user's OpenClaw profile configuration, which is expected for this integration but is still account credential use.

Skill content
CONFIG_PATH="$HOME/.openclaw-${PROFILE}/openclaw.json"
BOT_TOKEN=$(grep botToken "$CONFIG_PATH" 2>/dev/null | sed 's/.*"botToken": *"\([^"]*\)".*/\1/')
Recommendation

Store the bot token carefully, use a dedicated low-privilege bot, and rotate the token if it may have been exposed.

What this means

Private messages, documents, browser tabs, or credentials visible on screen could be included in the uploaded screenshot.

Why it was flagged

The script captures the full screen, stores it locally, and uploads it to Telegram using the supplied chat ID. This is the core purpose, but it moves potentially sensitive visual data to an external provider.

Skill content
/usr/sbin/screencapture -x "${WORKSPACE}/screen.png"
RESPONSE=$(curl -s -X POST "https://api.telegram.org/bot${BOT_TOKEN}/sendPhoto" \
    -F "chat_id=${CHAT_ID}" \
    -F "photo=@${WORKSPACE}/screen.png")
Recommendation

Check the screen before capture, verify the destination chat, and delete the workspace screenshot afterward if it contains sensitive information.