WOLP LAN Power Control

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken target MAC/IP or unintended invocation could send a power-control packet to the wrong LAN device.

Why it was flagged

The included script sends UDP packets to a specified host/port for shutdown support. This matches the stated purpose, but it is a high-impact device-control action.

Skill content
with socket.socket(socket.AF_INET, socket.SOCK_DGRAM) as sock:
        sock.sendto(payload, (normalized_host, normalized_port))
Recommendation

Confirm the target MAC address, IP address, port, and intended action before non-dry-run use; prefer `--dry-run` first.

What this means

Installing an unverified external package or build output as a service could affect the target machine beyond this skill.

Why it was flagged

The documented setup can download and install external release packages or build scripts with elevated privileges. This is related to the WOL-plus client purpose, but the artifacts do not show pinning, checksums, or signature verification.

Skill content
download `installer_windows_amd64_v<version>.exe` from Releases ... `sudo dpkg -i wolp-client_<version>_amd64.deb` ... `bash scripts/build-deb.sh amd64 0.0.0-dev`
Recommendation

Use a trusted, pinned release; verify checksums/signatures where available; avoid sudo installation unless you trust the WOL-plus client source.

What this means

Until changed, anyone who can reach the Web UI may be able to access the client using default credentials.

Why it was flagged

The optional client exposes a Web UI with known default credentials. SKILL.md does tell the user to change the default password, so this is disclosed, but it is still a privilege boundary to notice.

Skill content
Default Web UI access: ... username: `admin` ... password: `admin123`
Recommendation

Change the default password immediately, restrict access to the Web UI, and install only on machines you administer.

What this means

The agent may list or reuse a device entry that was not created for your network, and LAN device identifiers from prior use are persisted in the skill directory.

Why it was flagged

The bundled persistent inventory contains a real-looking LAN device record rather than an empty or clearly sample-only entry. Because the skill can act on inventory entries by device name, this stale context could be over-trusted or used for an unintended power-control target.

Skill content
"device-c87f54": {
      "mac": "C8:7F:54:9E:60:B2",
      "host": "192.168.50.18",
      "extra_data": "AA:BB:CC:DD:11:22"
    }
Recommendation

Clear or replace `assets/devices.json` before use, require explicit user-provided device details, and avoid acting on bundled inventory entries unless you created them.