Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Cursor IDE Agent

Use Cursor Agent for coding tasks via two paths: (1) Local CLI — run Cursor Agent directly from terminal for fast, general-purpose coding in any project; (2)...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 430 · 1 current installs · 1 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name, description, and required binaries (agent or cursor-agent) align with a Cursor CLI/Node integration. The instructions focus on CLI and Node workflows expected for an IDE agent. However repository metadata (_meta.json owner, README author links, and published version) do not consistently match the registry metadata (owner ID and version 3.0.2), which is an inconsistency in provenance.
!
Instruction Scope
SKILL.md instructs the user to install and invoke the Cursor CLI and describes reading project-level files (.cursor/rules, AGENTS.md, CLAUDE.md, mcp.json) and using @filename to include context. These are coherent for a code agent, but the instructions also include running an external installer via curl https://cursor.com/install | bash and recommend running interactive TUI via PTY. The curl|bash pattern and the ability to include arbitrary files from the workspace increase risk if users or agents run commands without inspection.
!
Install Mechanism
There is no automated install spec in the package (instruction-only), but SKILL.md explicitly tells users to run curl https://cursor.com/install -fsS | bash. Executing remote install scripts piped to a shell is higher risk even when hosted on a well-known domain; the guidance should advise inspecting the script or using a package manager/homebrew alternative. The README also lists a Homebrew install path, which is lower risk, but the primary example is the curl|bash flow.
Credentials
The skill declares no required environment variables, no credentials, and no required config paths. The files and project-level paths the skill references (workspace files, .cursor rules) are proportional to a coding assistant. No unrelated secrets or cloud credentials are requested.
Persistence & Privilege
always:false and default invocation behavior is normal. The skill does not request to modify other skills or system-wide configuration. It documents reading project workspace files and interacting with Cursor cloud endpoints when the user opts in, which is expected for this functionality.
Scan Findings in Context
[no_code_files_to_scan] expected: The static scanner had no code files to analyze because this is an instruction-only skill (SKILL.md and README only). Absence of findings is not evidence of safety; review the instructions carefully (they include a remote install command).
What to consider before installing
This skill largely does what it says: it's a wrapper/guide for using the Cursor CLI and Node-based remote IDE. However: (1) metadata mismatches (different owner names and version numbers across registry info, README, and _meta.json) reduce confidence in provenance — prefer skills whose metadata and source are consistent and verifiable; (2) SKILL.md recommends running curl https://cursor.com/install | bash — do not run remote install scripts blindly. If you need the CLI, prefer a package-manager install (Homebrew, distribution package) or fetch the install script and inspect it before executing; (3) the agent/workflows read project files (e.g., .cursor/rules, AGENTS.md, mcp.json, any file referenced with @filename). Only grant workspace access to code/projects you trust; avoid pointing the agent at sensitive system paths; (4) confirm the cursor.com domain and verify authenticity of the installer and binary versions (agent vs cursor-agent) before installing; (5) because this is instruction-only, there is no bundled code to audit — treat the instructions as the security surface and verify any external binaries and network endpoints the skill recommends.

Like a lobster shell, security has layers — review code before you run it.

Current versionv3.0.2
Download zip
latestvk9751ax4r06kg5k5x4ryhyverd81x8z1

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🖥️ Clawdis
Any binagent, cursor-agent

SKILL.md

Cursor Agent Skill

Two ways to use Cursor Agent from OpenClaw, for different scenarios.

Related

Path Selection

ScenarioPathWhy
Quick coding task, bug fix, refactorCLIFast, no setup, works anywhere
Generate code, review PR, write testsCLINon-interactive -p mode is perfect
Fix type errors using real diagnosticsNodediagnostics.get shows actual TS/lint errors
Navigate definitions/references firstNodelang.definition, lang.references
Run project tests and iterateNodetest.run + test.results loop
Debug with breakpointsNodeFull debug protocol
Targeted changes to a specific projectNodeIDE workspace context is precise

Default: CLI. Use Node only when you specifically need IDE intelligence.


Path 1: CLI (Local Cursor Agent)

Prerequisites

# Install
curl https://cursor.com/install -fsS | bash

# Login
agent login

# Verify
agent --version

Modes

ModeFlagUse Case
Agent(default)Full coding — reads, writes, runs commands
Plan--plan or --mode=planDesign approach first, then choose local or cloud execution
Ask--mode=askRead-only codebase exploration, no edits

Interactive Mode

# Start interactive session
agent

# Start with prompt
agent "refactor the auth module to use JWT tokens"

# Start in plan mode
agent --plan "design a caching layer for the API"

# Start in ask mode
agent --mode=ask "explain how the auth middleware works"

Non-Interactive Mode (Automation)

# One-shot task (prints result, exits)
agent -p "find and fix all unused imports in src/"

# With specific model
agent -p "review this code for security issues" --model gpt-5.2

# JSON output for parsing
agent -p "list all TODO comments" --output-format json

# Streaming JSON (real-time)
agent -p "run tests and report" --output-format stream-json --stream-partial-output

# Force mode (auto-apply changes, no confirmation)
agent -p "fix all linting errors" --force

Cloud Agent Handoff

Push work to Cursor's cloud to continue running while you're away:

# Start directly in cloud
agent -c "refactor the auth module and add comprehensive tests"

# Mid-conversation: prepend & to send to cloud
& refactor the auth module and add comprehensive tests

Pick up at cursor.com/agents.

Session Management

agent ls              # List previous conversations
agent resume          # Resume most recent
agent --continue      # Continue previous session
agent --resume="id"   # Resume specific conversation

Slash Commands (Interactive)

CommandAction
/planSwitch to Plan mode / view current plan
/askSwitch to Ask mode
/modelsSwitch AI model
/compressSummarize conversation, free context
/rulesCreate/edit rules
/commandsCreate/edit custom commands
/mcp enable <name>Enable MCP server
/mcp disable <name>Disable MCP server
/sandboxConfigure sandbox mode
/max-mode [on|off]Toggle Max Mode
/resumeResume previous conversation

Keyboard Shortcuts

ShortcutAction
Shift+TabRotate modes (Agent → Plan → Ask)
Shift+EnterInsert newline (multi-line prompt)
Ctrl+RReview changes (i for instructions, arrows to navigate)
Ctrl+DExit (double-press for safety)
ArrowUpCycle previous messages

Context & Rules

The CLI automatically loads:

  • .cursor/rules directory
  • AGENTS.md at project root
  • CLAUDE.md at project root
  • MCP servers from mcp.json

Use @filename or @directory/ in interactive mode to include context.

⚠️ Using CLI from OpenClaw (PTY Required)

Cursor CLI is an interactive TUI — it needs a real terminal. Use pty:true:

# ✅ Correct — with PTY
exec pty:true command:"agent -p 'Your task'" workdir:/path/to/project

# ✅ Background for longer tasks
exec pty:true background:true command:"agent -p 'Build REST API'" workdir:/path/to/project

# ❌ Wrong — will hang
exec command:"agent -p 'Your task'"

For long tasks, use background + poll:

# Start
exec pty:true background:true workdir:~/project command:"agent -p 'Add comprehensive tests for the auth module' --force"

# Check progress
process action:log sessionId:XXX

# Check if done
process action:poll sessionId:XXX

Sandbox Controls

# Start with sandbox enabled
agent --sandbox enabled

# Start with sandbox disabled
agent --sandbox disabled

# Configure interactively
/sandbox

Sandbox supports granular network access controls — define which domains the agent can reach.


Path 2: VS Code / Cursor Node

Remote-control a Cursor/VS Code IDE through the OpenClaw Node protocol. The IDE must have the openclaw-node-vscode extension installed and connected.

Prerequisites

  • Extension installed: VS Code Marketplace
  • Node visible in nodes status
  • Extension status bar shows 🟢

Invocation Pattern

nodes invoke --node "<name>" --invokeCommand "<cmd>" --invokeParamsJson '{"key":"val"}'

Timeout Guide

OperationinvokeTimeoutMsNotes
File/editor/lang15000Fast IDE operations
Git30000May involve disk I/O
Test60000Depends on test suite
Agent plan/ask180000AI thinking time
Agent run300000Full coding task

Command Reference

CategoryPrefixKey Commands
Filevscode.file.*read, write, edit, delete
Directoryvscode.dir.*list
Languagevscode.lang.*definition, references, hover, symbols, rename, codeActions, format
Editorvscode.editor.*context, openFiles, selections
Diagnosticsvscode.diagnostics.*get (errors/warnings)
Gitvscode.git.*status, diff, log, blame, stage, unstage, commit, stash
Testvscode.test.*list, run, results
Debugvscode.debug.*launch, stop, breakpoint, evaluate, stackTrace, variables, status
Agentvscode.agent.*status, run, setup
Workspacevscode.workspace.*info

Quick Examples

# Read a file
nodes invoke --node "my-cursor" --invokeCommand "vscode.file.read" \
  --invokeParamsJson '{"path":"src/main.ts"}'

# Get diagnostics (real type errors!)
nodes invoke --node "my-cursor" --invokeCommand "vscode.diagnostics.get"

# Go to definition
nodes invoke --node "my-cursor" --invokeCommand "vscode.lang.definition" \
  --invokeParamsJson '{"path":"src/main.ts","line":10,"character":5}'

# Git status + commit
nodes invoke --node "my-cursor" --invokeCommand "vscode.git.status"
nodes invoke --node "my-cursor" --invokeCommand "vscode.git.stage" \
  --invokeParamsJson '{"paths":["src/main.ts"]}'
nodes invoke --node "my-cursor" --invokeCommand "vscode.git.commit" \
  --invokeParamsJson '{"message":"fix: resolve type error"}'

# Delegate to Cursor Agent (through IDE)
nodes invoke --node "my-cursor" --invokeCommand "vscode.agent.run" \
  --invokeParamsJson '{"prompt":"Add error handling to all API endpoints","mode":"plan"}' \
  --invokeTimeoutMs 180000

Node Workflow: Fix → Verify → Commit

The real power of Node path — a closed loop with IDE intelligence:

1. diagnostics.get           → Find real errors
2. vscode.agent.run (fix)    → Let Cursor Agent fix them
3. diagnostics.get           → Verify errors resolved
4. test.run                  → Run tests
5. test.results              → Check results
6. git.diff                  → Review changes
7. git.stage + git.commit    → Ship it

No tmux, no TTY hacks — all through VS Code API.


Combined Workflow Example

Use CLI for broad tasks, switch to Node for precision:

1. CLI: agent -p "implement user authentication module" --force
   → Generates the initial code quickly

2. Node: vscode.diagnostics.get
   → Reveals 3 type errors the CLI missed

3. Node: vscode.agent.run '{"prompt":"fix these type errors: ..."}'
   → Fixes with full IDE context

4. Node: vscode.test.run
   → Runs test suite

5. Node: vscode.git.stage + vscode.git.commit
   → Clean commit

Error Handling

ErrorCauseFix
CLI hangsNo PTYAdd pty:true to exec
node not foundExtension disconnectedCheck VS Code status bar
command not allowedGateway whitelistAdd to gateway.nodes.allowCommands
timeoutOperation too longIncrease invokeTimeoutMs
path traversal blockedAbsolute path usedUse relative paths for Node

Security

  • CLI: Respects sandbox mode, command approval, rules
  • Node: All paths relative to workspace, Ed25519 device identity, Gateway approval required
  • Both: No raw shell access by default

Files

3 total
Select a file
Select a file to preview.

Comments

Loading comments…