Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Cursor CLI
v1.1.1Use Cursor editor and Cursor agent for coding tasks
⭐ 0· 1.8k·9 current·10 all-time
byAleksander Pyavchik@pyavchik
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description request the cursor and cursor-agent CLIs and the SKILL.md only references those binaries — the declared requirements match the stated purpose.
Instruction Scope
Runtime instructions only show example cursor and cursor-agent commands, suggest running from the project directory, and do not ask the agent to read unrelated files, env vars, or contact unexpected endpoints.
Install Mechanism
No install spec is present (instruction-only). Nothing will be written to disk by the skill itself; it assumes the user already has the cursor/cursor-agent binaries.
Credentials
The skill requests no environment variables, credentials, or config paths — appropriate for a CLI usage guide that simply invokes local tools.
Persistence & Privilege
always is false and the skill does not request persistent privileges or modify other skills or system settings; autonomous invocation is allowed by default but is not elevated here.
Assessment
This skill is a documentation/instruction-only wrapper for the Cursor CLI and Cursor Agent; it does not install software or request secrets. Before installing or using it, make sure you actually have the official cursor and cursor-agent binaries from Cursor (verify download source/signature) and understand that using cursor-agent will send prompts and likely code snippets to Cursor's service (privacy/third-party transmission). If you don't want any code or context sent to external services, do not invoke cursor-agent. Also confirm the metadata/homepage (https://cursor.com/docs/cli/overview) matches the official project to avoid running a similarly named but untrusted binary.Like a lobster shell, security has layers — review code before you run it.
latestvk97cmkmh6rqq0dsg5fe0h4d3ws81gqgh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⌨️ Clawdis
Binscursor, cursor-agent
