Snapmaker
v1.2.2Control and monitor Snapmaker 2.0 3D printers via their HTTP API. Status, job management, progress watching, and event monitoring.
⭐ 1· 1.8k·0 current·0 all-time
byOliver Drobnik@odrobnik
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included scripts and SKILL.md. The scripts implement discovery, status, job control, and monitoring via the Snapmaker HTTP/UDP LAN APIs and require only a printer IP and token, which aligns with the stated purpose.
Instruction Scope
SKILL.md instructs creating a local config.json with the device token and running the provided Python scripts. The scripts only access the workspace for config, optionally logs under a workspace/.openclaw path, /tmp, and the local network (UDP broadcast and HTTP to the printer). There is no evidence of instructions to read unrelated system secrets or exfiltrate data to third parties.
Install Mechanism
There is no install spec; the skill is instruction+script-only. It requires python3 and the requests library (noted in truncated dependencies). No remote downloads or archives are installed by the skill itself.
Credentials
The skill requests no environment credentials. It optionally honors SNAPMAKER_WORKSPACE, PWD, and TMPDIR for locating workspace/config/logs which is reasonable for a workspace-centric CLI tool. The printer token is provided by the user in config.json — appropriate and proportional.
Persistence & Privilege
always is false and the skill does not attempt to change other skills or global agent settings. It writes logs only to a contained workspace path (or ~/.openclaw fallback) and does not persist global credentials.
Assessment
This skill appears coherent and limited to controlling a Snapmaker on your local network, but take these precautions before installing: (1) Keep the printer token in a local config.json that is not checked into source control; treat it like a secret. (2) The token is sent as an HTTP query parameter to the printer on your LAN — use only on trusted networks. (3) The tool performs UDP broadcasts for discovery; be comfortable with it sending LAN discovery packets. (4) Ensure the requests Python package is available in your environment. (5) Review config.json.example and the included scripts if you want to confirm logging paths and allowed file paths before use.Like a lobster shell, security has layers — review code before you run it.
latestvk970fs9mqyjrymnf3k91nytch9826j2p
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🖨️ Clawdis
Binspython3
