TRIGGERcmd - Run commands on your computers remotely

PassAudited by ClawScan on May 10, 2026.

Overview

This skill clearly does what it claims—uses a TRIGGERcmd token to list and run commands on your registered computers—but that is powerful and should be used carefully.

Install this only if you trust the agent to trigger TRIGGERcmd actions on your computers. Keep your API token private, prefer temporary environment-variable use when possible, review the available commands first, and require confirmation before running anything that could change files, devices, services, or system state.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could trigger real actions on your computers through TRIGGERcmd.

Why it was flagged

The skill intentionally enables remote command execution across registered computers. This is the stated purpose and is disclosed, but it is a high-impact capability if used on the wrong command or device.

Skill content
Use this skill to inspect and run TRIGGERcmd commands on any computer that is registered with the account tied to the local API token.
Recommendation

Review available commands before running them, keep destructive commands out of TRIGGERcmd where possible, and require confirmation for commands with side effects.

What this means

Anyone or any process with access to the token may be able to list and run TRIGGERcmd commands for your account.

Why it was flagged

The skill requires a TRIGGERcmd API token and can read it from an environment variable or a local token file. This is expected for the service integration, but the token represents account authority.

Skill content
Set `TRIGGERCMD_TOKEN` to your personal API token ... Store token at `~/.TRIGGERcmdData/token.tkn`
Recommendation

Use a dedicated token if possible, restrict the token file to owner-only permissions, and rotate the token if it may have been exposed.

What this means

The local agent will run curl and jq commands to contact TRIGGERcmd, and the remote TRIGGERcmd service may then execute configured commands on registered machines.

Why it was flagged

The skill documents local shell snippets that call the TRIGGERcmd API. These commands are central to the skill’s purpose and are not hidden or obfuscated.

Skill content
curl -sS -X POST "${BASE_URL}/run/trigger" ... -d "$PAYLOAD"
Recommendation

Use the skill only in a trusted shell environment and inspect the command name, target computer, and parameters before triggering remote actions.

What this means

A token saved on disk may remain available to future sessions or local processes that can read the file.

Why it was flagged

The skill supports persistent local credential storage. It gives appropriate permission guidance, but persistent secrets should be protected from accidental reuse or exposure.

Skill content
If using the token file method, ensure `~/.TRIGGERcmdData/token.tkn` has permissions set to `600`
Recommendation

Prefer the environment variable for temporary use, keep the token file permission-restricted, and remove the file when no longer needed.