TIA-OPENNESS-COMPLETE-SKILL
v1.0.1基于TIA Openness API的完整PLC自动化技能,支持项目创建、硬件配置、SCL编程、编译下载
⭐ 1· 203·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The skill claims end-to-end TIA Openness automation and the code implements that: it uses pythonnet to load Siemens.Engineering assemblies, reads the registry for Openness DLL paths, provides project/device/block/compile/download operations, and uses jinja2 templates to generate SCL — all expected for this purpose.
Instruction Scope
SKILL.md and code instruct the agent to attach/start TIA Portal, read HKLM registry keys, create filesystem projects, generate code, and connect to PLCs by IP (including accepting a PLC password parameter). These actions are within scope for PLC automation but are high-impact (can write/compile/download firmware to PLCs).
Install Mechanism
There is no install spec (instruction-only skill), and the code relies on pip-installable packages (pythonnet, jinja2). No remote downloads or unusual installers are used in the manifest. Risk from installation is low, but pythonnet implies dependency on .NET and local Siemens assemblies.
Credentials
The skill requests no environment variables or external credentials in metadata. It does accept a PLC password and optional UMAC creds as runtime parameters (appropriate for downloading to protected PLCs). It reads HKLM registry to locate Openness DLLs — expected and proportional for this functionality.
Persistence & Privilege
The skill is not marked always:true and does not request system-wide persistence. It attaches to or launches local TIA Portal processes and manipulates project files (normal for this domain). It does read system registry entries but does not modify other skills or global agent settings.
Assessment
This skill appears internally consistent for automating TIA Portal via Openness, but it has strong local privileges: it reads HKLM, loads Siemens .NET assemblies, creates/saves projects, and can compile/download code to PLCs (taking a PLC password). Before installing: 1) Confirm you trust the unknown source (no homepage/source URL provided). 2) Inspect the full tia_core.py (the provided manifest output was truncated) to ensure there is no hidden network exfiltration or unexpected behavior in the download/auth callbacks. 3) Test in an isolated lab (not against production PLCs). 4) Ensure required environment (Windows, TIA Portal with Openness, pythonnet) and that you understand the firewall prompt and permissions. 5) If you must use it in production, restrict the agent environment and credentials, and review how passwords/UMAC are handled so they are not persisted or leaked.Like a lobster shell, security has layers — review code before you run it.
latestvk9719z1v3spmp38jknj92azb6583919k
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
