Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Mu Pet
v1.0.0Animated pixel art desktop pet that roams the screen as an always-on-top Electron overlay. The pet avoids the cursor and active windows, walks along screen e...
⭐ 0· 943·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description match the implementation: an Electron overlay that moves around the screen, avoids cursor and frontmost window (using AppleScript to get front window bounds), and exposes a local HTTP API. macOS-only behavior (osascript, LaunchAgent) is coherent with the stated platform.
Instruction Scope
Runtime instructions and code stay within the pet's purpose. The app exposes an HTTP API on 127.0.0.1:18891 to set/get pet state (used by the agent). The app also runs osascript (via child_process.execSync) to query the frontmost application window — this accesses window bounds via System Events, which may trigger macOS Automation/Accessibility prompts. The local API is unauthenticated, so any local process can change the pet's state.
Install Mechanism
The provided install script copies the app to ~/.openclaw/desktop-pet and runs npm install --production. This pulls packages (electron, express) from npm — standard for Node apps but carries the usual npm risk (package code and lifecycle scripts executed during install). No remote arbitrary downloads or obscure short URLs are used; install artifacts are placed in a user directory and a LaunchAgent plist is written to ~/Library/LaunchAgents.
Credentials
No environment variables, credentials, or system-wide config paths beyond the user LaunchAgents folder are requested. The app legitimately needs system-level window/cursor info for its behavior; those accesses are local and aligned to the stated functionality.
Persistence & Privilege
Installer creates a LaunchAgent (label ai.openclaw.desktop-pet) with RunAtLoad and KeepAlive so the pet auto-starts at login and stays running. This is appropriate for a desktop companion but grants persistent user-level auto-launch; always:false (not force-included) and it does not modify other skills' configurations.
Assessment
What to consider before installing:
- This installs a local Electron app in your home directory and runs npm install, which will fetch packages (electron, express) from npm and run any package install scripts — common for Node apps but a vector for supply-chain risk. Only proceed if you trust the skill source.
- The installer writes a LaunchAgent plist to ~/Library/LaunchAgents and loads it immediately so the pet auto-starts on login. The uninstall script removes this, but check the plist before allowing it to run.
- The app uses osascript (AppleScript via child_process.execSync) to read the frontmost window's bounds. macOS may prompt you for Automation/Accessibility/Automation permissions when this runs.
- The pet exposes an unauthenticated HTTP API on 127.0.0.1:18891. Any local process can call it to change the pet's state (show text bubbles, etc.). This is expected functionality but be aware of local access.
- The Electron BrowserWindow is created with nodeIntegration: true and contextIsolation: false (renderer has Node privileges). This is typical for simple local Electron tools, but increases impact if the renderer could be fed untrusted content. In this package the UI is local files; still, be cautious about editing or enabling remote content.
- If you want to be extra careful: inspect main.js/index.html yourself, run the app in a sandboxed environment first (or review npm install output), and verify the LaunchAgent plist path and ProgramArguments before loading it with launchctl.
Overall: the skill appears coherent for a macOS desktop pet; the risks are operational (npm install, LaunchAgent persistence, local unauthenticated API) rather than indicators of hidden malicious intent.Like a lobster shell, security has layers — review code before you run it.
latestvk974an3c10xv9a8kpbwknrxpt581enkz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
