Wled
v0.1.0Control WLED LED controllers via HTTP API. Use when a user asks to control WLED lights, LED strips, or ESP-based LED controllers. Supports power on/off, brightness, colors (RGB), effects, palettes, presets, and device status.
⭐ 1· 2k·2 current·2 all-time
byAlex Buchan@rowbotik
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the implementation: the script makes HTTP calls to WLED's /json endpoints and exposes power, brightness, color, effects, palettes, presets, and status. No unrelated environment variables, binaries, or services are required.
Instruction Scope
SKILL.md instructs only on contacting local WLED devices, config file usage (~/.wled/config.json etc.), and optional WLED_HOST env var. The runtime instructions and CLI behavior in scripts/wled.py align with the doc and do not read or transmit data outside the target device or local config files.
Install Mechanism
Instruction-only with a bundled script; no install spec or downloads. Lowest-risk distribution model (no archives or external installers).
Credentials
No required environment variables or credentials are declared; the only optional env var is WLED_HOST which is appropriate for device targeting. Config file paths read (home/config) are proportional for aliasing devices.
Persistence & Privilege
Skill is not always-enabled and is user-invocable. It does not modify other skills or system-wide configurations; it only reads its own config file locations.
Assessment
This skill appears to do what it says: send HTTP JSON requests to a WLED device you specify. Before installing, make sure you: (1) only point it at devices you control/trust (it will make requests to whatever host you provide), (2) are comfortable with the script reading config files at ~/.wled/config.json, ~/.config/wled/config.json, or ./.wled-config.json (these store device IPs/aliases), and (3) do not supply router or other administrative credentials to third parties while following the static-IP instructions. The skill does not exfiltrate data to external endpoints, request unrelated credentials, or install external packages.Like a lobster shell, security has layers — review code before you run it.
latestvk972fc2tcdtpmn6hjf1agjce5h809n03
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
