Peekaboo
v1.0.0Capture and automate macOS UI with the Peekaboo CLI.
⭐ 69· 23.6k·1.2k current·1.2k all-time
byPeter Steinberger@steipete
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description advertise macOS UI capture and automation and the instructions exclusively document peekaboo CLI commands (capture, click, type, app/window management, clipboard, etc.). The embedded metadata points to a Homebrew formula to provide the peekaboo binary — this is coherent for a CLI-focused skill.
Instruction Scope
The runtime instructions only tell the agent to run peekaboo CLI commands and pass file paths/flags. They do not instruct reading unrelated system files or environment variables. However, the tool's legitimate features include screen capture and clipboard access and can operate on application windows — these are high-privilege/sensitive operations (you should expect it can capture screen contents and clipboard data when granted permission).
Install Mechanism
The skill package is instruction-only (no installer executed by the platform). The SKILL.md metadata recommends installing the binary via a Homebrew formula: steipete/tap/peekaboo. Homebrew installs are typical for macOS CLIs, but this is a third-party tap (not an official core formula); verify the tap and upstream source before installing binaries from it.
Credentials
The skill declares no required environment variables or credentials. The commands mention a 'config' subcommand that can manage providers/models/credentials — this likely refers to optional configuration stored by the CLI itself, not required by the skill. There is no unexplained request for unrelated secrets in the SKILL.md.
Persistence & Privilege
The skill does not request always:true and is user-invocable only. It does rely on macOS Screen Recording and Accessibility permissions for full functionality — these are OS-level privileges required by any UI automation tool and should be granted only when you trust the binary.
Assessment
This skill appears internally consistent for a macOS UI-automation CLI, but be cautious before installing or running it: 1) Verify the Homebrew tap (steipete/tap) and the binary's upstream source or GitHub repo before installing; prefer official or widely-reviewed releases. 2) Only grant Screen Recording and Accessibility permissions when you trust the binary — these permissions allow screen capture and control of apps and can expose sensitive data. 3) Expect the tool to be able to read the clipboard, take screenshots, and control apps; avoid using it while sensitive information is on screen or in clipboard. 4) If the CLI asks you to store credentials in its config, confirm why those credentials are needed and where they are stored. 5) If you need lower risk, run tests in a limited account or VM, or audit the binary source before use.Like a lobster shell, security has layers — review code before you run it.
latestvk979a540wc1hsb23fpz63n5ags7ykpnn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
👀 Clawdis
OSmacOS
Binspeekaboo
Install
Install Peekaboo (brew)
Bins: peekaboo
brew install steipete/tap/peekaboo