Clawd Cursor 0.6.0

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a disclosed desktop-control skill, but it asks the agent to run external Node code and start a hidden background controller with broad access to the user's screen and apps.

Install only if you are comfortable giving a local agent broad ability to see and operate your desktop. Before use, inspect and pin the external GitHub/npm code, start the controller only with explicit consent, verify how to stop it, and prefer local processing or non-sensitive screens for private work.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent can see and operate applications on the user's desktop during tasks.

Why it was flagged

This shows the skill intentionally grants broad GUI control and screen visibility. That is aligned with its purpose, but it is powerful enough to affect accounts, settings, messages, or transactions if used carelessly.

Skill content
You **CAN** open apps, click buttons, type text, fill forms ... You **CAN** see what's on screen ... interact with applications — browser, desktop apps, settings
Recommendation

Use only for explicitly requested desktop tasks, monitor the session, and require confirmation before messaging, financial, admin, account, or settings changes.

What this means

A desktop automation controller may be started invisibly and continue operating during the session without a fresh user approval at startup.

Why it was flagged

The skill instructs the agent to launch the desktop-control server without asking and to hide the process window, while tasks can continue in the background.

Skill content
If connection refused — **start it yourself** (don't ask the user): ... Start-Process -FilePath "node" ... -WindowStyle Hidden ... The task runs in the background.
Recommendation

Require explicit user approval before starting the service, run it visibly where possible, and provide or verify a clear stop command before use.

What this means

Installing the skill can execute external code on the user's machine with the same local access needed for desktop automation.

Why it was flagged

The install path fetches, builds, and runs external Node/npm code rather than code included in the submitted skill artifacts. No pinned commit or reviewed lockfile is shown in the provided artifacts.

Skill content
install:
  - git clone https://github.com/AmrDab/clawd-cursor.git
  - cd clawd-cursor && npm install && npm run build
  - cd clawd-cursor && npx clawd-cursor doctor
  - cd clawd-cursor && npm start
Recommendation

Inspect the GitHub repository first, pin to a trusted commit or release, review npm dependencies/lockfiles, and consider running it in a restricted test environment.

What this means

The configured AI provider/API key may be used when the desktop agent processes tasks.

Why it was flagged

Using the active provider credential is expected for an AI desktop agent, but the user should recognize that the provider key may be used for screen-analysis tasks and possible usage charges.

Skill content
In OpenClaw, this skill inherits the active agent's AI provider + API key.
Recommendation

Use a trusted provider configuration, prefer a limited-use key where available, and use local Ollama mode if you do not want cloud API use.

What this means

Private information visible on screen could be sent to the selected AI provider during automation.

Why it was flagged

The artifacts disclose that on-screen content can cross a provider boundary when a cloud model is used. This is purpose-aligned, but screenshots/text may contain sensitive data.

Skill content
If using a cloud provider (Anthropic, OpenAI, Kimi), screenshots/text are sent to that provider's API only ... The user controls which provider is used.
Recommendation

Use local mode for sensitive work, close or hide private apps before tasks, and confirm which provider is configured.