WordPress REST API

v0.6.0

Work with the WordPress REST API for route discovery, authentication, reads and writes, core endpoint selection, and custom namespace inspection. Use when a...

0· 544·6 current·7 all-time
byMatthew Murphy@matthewxmurphy
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill is an inspector for WordPress REST routes and includes reference docs and a discovery script that performs HTTP GET/OPTIONS against /wp-json. That matches the name and description. One mismatch: the skill declares no required binaries or environment variables, yet the provided script clearly requires curl and python3 (and mktemp), so the metadata is incomplete.
Instruction Scope
SKILL.md restricts scope to REST discovery, auth model selection, and inspecting routes. The included script only fetches and prints/parses responses from the target site (GET or OPTIONS), lists namespaces/routes, and pretty-prints JSON. It does not attempt to read unrelated local files or contact third-party endpoints. Caveats: the script follows redirects (--location) and will perform arbitrary HTTP requests to any supplied URL, so if run in an environment with internal network access it can probe internal services. Also, credentials passed on the command line may be visible to other local processes via process lists.
Install Mechanism
There is no install spec (instruction-only plus a script). Nothing is downloaded or written by an installer; the only file that runs is the included shell script. This is the lowest-risk install model.
Credentials
The skill does not request any environment variables, credentials, or config paths in metadata, which is proportionate to an inspector. However, the script accepts --user and --app-password arguments for Basic Auth; passing credentials on the command line can leak them via process listings. The skill correctly documents application passwords as a legitimate auth model and warns not to embed long-lived credentials in the repo.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or system-wide agent settings, and is user-invocable only. It retains no privileged persistence.
Assessment
This skill appears to do what it says: discover and inspect WordPress /wp-json routes. Before installing or running it, verify the agent environment has curl and python3 available (the script relies on them). Do not pass long-lived credentials directly on the command line — prefer temporary application passwords and a secure secret manager; the script currently accepts --app-password which can expose secrets via process listings. Be aware the script follows redirects and will make HTTP requests to any provided URL, so running it from an agent with network access can be used to probe internal services; only run it in environments you trust. If you plan to use this in production, consider hardening the script to read passwords from stdin or a protected file/socket and to optionally disable following redirects.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🌐 Clawdis
latestvk9799jcpyx6j9tdwz4h6n56w6x82924n
544downloads
0stars
2versions
Updated 1mo ago
v0.6.0
MIT-0

WordPress REST API

Use this skill when the correct interface is HTTP against a WordPress site, not shell access with wp.

This skill is built around two facts:

  • WordPress core ships a large REST surface under /wp-json
  • the truly complete endpoint list is site-specific because plugins and custom code can register more routes

Treat the reference files as the core map and use the discovery script for the live map.

Use This Skill For

  • inspecting /wp-json on a live site
  • choosing the right core route before writing code or automation
  • authenticating with application passwords for machine-to-machine calls
  • checking cookie and nonce-based admin flows
  • inspecting custom plugin routes and namespaces
  • figuring out which methods and args a route accepts
  • designing or reviewing register_rest_route() implementations

Do Not Use This Skill For

  • normal shell-based site administration when wp access already exists
  • WP-CLI command or package development
  • pretending the static reference files can enumerate plugin routes on every site

Workflow

1. Discover The Live Route Index

Start with:

scripts/inspect-rest-api.sh --site https://example.com

This fetches the site index at /wp-json/, prints the namespaces, and lists the live routes that site exposes.

If you need one route only:

scripts/inspect-rest-api.sh --site https://example.com --route /wp/v2/posts
scripts/inspect-rest-api.sh --site https://example.com --route /wp/v2/posts --method OPTIONS

Read references/core-endpoints.md before assuming a core route name from memory.

2. Choose The Right Auth Model

Default rule:

  • external automation: use application passwords over HTTPS
  • logged-in browser admin flow: use cookie auth plus nonce handling
  • public read-only data: use unauthenticated GET only when the site exposes it intentionally

Read references/auth-and-discovery.md.

3. Prefer Core Namespaces First

Core routes are more stable than plugin routes.

Common starting points:

  • posts, pages, media, comments, categories, tags
  • users and settings when authenticated
  • templates, template parts, patterns, and block-editor related routes on newer installs
  • plugins and themes only when the target site and permissions allow them

4. Inspect Custom Routes Live

For plugin or theme APIs, do not guess.

Use the discovery index and OPTIONS:

scripts/inspect-rest-api.sh --site https://example.com --route /my-namespace/v1/report --method OPTIONS

Then read references/custom-route-rules.md if you are implementing or reviewing the server-side route registration.

5. Keep Calls Small And Explicit

Default patterns:

  • use ?_fields= to trim large responses
  • use page, per_page, search, orderby, and order instead of client-side filtering when possible
  • check pagination headers such as X-WP-Total and X-WP-TotalPages
  • use OPTIONS before write automation when you do not control the site code

Files

  • scripts/inspect-rest-api.sh: discover the live route index or inspect a single route with GET or OPTIONS
  • references/core-endpoints.md: core route families worth checking before you inspect plugin namespaces
  • references/auth-and-discovery.md: application passwords, cookie auth, nonces, and route discovery rules
  • references/custom-route-rules.md: implementation-side guidance for registering or reviewing custom routes

Comments

Loading comments...