Wled

v0.1.0

Control WLED LED controllers via HTTP API. Use when a user asks to control WLED lights, LED strips, or ESP-based LED controllers. Supports power on/off, brightness, colors (RGB), effects, palettes, presets, and device status.

1· 2k·2 current·2 all-time
byAlex Buchan@rowbotik
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the implementation: the script makes HTTP calls to WLED's /json endpoints and exposes power, brightness, color, effects, palettes, presets, and status. No unrelated environment variables, binaries, or services are required.
Instruction Scope
SKILL.md instructs only on contacting local WLED devices, config file usage (~/.wled/config.json etc.), and optional WLED_HOST env var. The runtime instructions and CLI behavior in scripts/wled.py align with the doc and do not read or transmit data outside the target device or local config files.
Install Mechanism
Instruction-only with a bundled script; no install spec or downloads. Lowest-risk distribution model (no archives or external installers).
Credentials
No required environment variables or credentials are declared; the only optional env var is WLED_HOST which is appropriate for device targeting. Config file paths read (home/config) are proportional for aliasing devices.
Persistence & Privilege
Skill is not always-enabled and is user-invocable. It does not modify other skills or system-wide configurations; it only reads its own config file locations.
Assessment
This skill appears to do what it says: send HTTP JSON requests to a WLED device you specify. Before installing, make sure you: (1) only point it at devices you control/trust (it will make requests to whatever host you provide), (2) are comfortable with the script reading config files at ~/.wled/config.json, ~/.config/wled/config.json, or ./.wled-config.json (these store device IPs/aliases), and (3) do not supply router or other administrative credentials to third parties while following the static-IP instructions. The skill does not exfiltrate data to external endpoints, request unrelated credentials, or install external packages.

Like a lobster shell, security has layers — review code before you run it.

latestvk972fc2tcdtpmn6hjf1agjce5h809n03

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments