Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

cli2skill

v1.0.1

Turn any CLI or MCP server into an Agent Skill. Use when you want to replace an MCP server with a zero-overhead CLI skill, or generate a skill from any comma...

0· 91·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for 2233admin/cli2skill.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "cli2skill" (2233admin/cli2skill) from ClawHub.
Skill page: https://clawhub.ai/2233admin/cli2skill
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install cli2skill

ClawHub CLI

Package manager switcher

npx clawhub@latest install cli2skill
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (convert CLIs/MCP servers into Agent Skills) matches the code and SKILL.md. The code implements help-parsing, skill generation, and an MCP handshake/extraction flow; those actions are necessary for the stated functionality.
Instruction Scope
Runtime instructions and examples are consistent with the tool. Important behaviour to note: the tool runs arbitrary executables to capture --help and to query subcommands, and when using the mcp flow it spawns the provided MCP command, sends JSON-RPC messages, and reads its stdout. The SKILL.md also documents reading a Claude Code settings.json (user-supplied path). These actions are expected for the stated purpose but give the tool the ability to execute arbitrary local commands and to read a user-provided config file.
Install Mechanism
No install spec in the registry entry (instruction-only), and README suggests standard pip/pipx install. There are no remote downloads or opaque installers declared in the registry metadata. This is low-risk as packaged code is present in the bundle for review.
Credentials
The skill declares no required environment variables, which matches the registry metadata. However, the MCP extraction flow will merge provided env entries with os.environ and will expand ${VAR} references from a settings.json; this is appropriate for connecting to configured MCP servers but means the tool can read environment variables when asked to (via config or --env) and will expose them to spawned subprocesses. That capability is proportionate to the feature but is sensitive — secrets in settings.json or in environment will be visible to launched processes and may appear in outputs.
Persistence & Privilege
always:false and no persistent background services. The tool spawns processes on demand and communicates with them; it attempts to kill on timeout. It does not modify other skills or system-wide agent configuration. No elevated or permanent privileges are requested.
Assessment
This tool is coherent and appears to do what it says, but it executes arbitrary local commands and can read a user-provided Claude Code settings.json and environment variables when asked. Before running: (1) avoid pointing it at untrusted or unknown MCP servers/commands — they will be executed; (2) inspect any settings.json you pass in for embedded secrets or remote commands; (3) prefer using --help-file or a saved help output when you only need parsing (to avoid executing binaries); (4) avoid passing secrets via --env unless necessary, and do this in a controlled environment (container or limited user account) if possible; (5) review generated SKILL.md files before dropping them into your agent skills directory. If you need additional assurance, run the tool in a sandbox or review the specific command(s) it will execute.

Like a lobster shell, security has layers — review code before you run it.

agent-skillvk97dxkkey3fnz56rgw9fnjhzrh84135xclivk97dxkkey3fnz56rgw9fnjhzrh84135xcode-generatorvk97dxkkey3fnz56rgw9fnjhzrh84135xlatestvk97dxkkey3fnz56rgw9fnjhzrh84135xmcpvk97dxkkey3fnz56rgw9fnjhzrh84135xpythonvk97dxkkey3fnz56rgw9fnjhzrh84135x
91downloads
0stars
2versions
Updated 3w ago
v1.0.1
MIT-0

cli2skill

Convert CLI tools and MCP servers into Agent Skills (markdown files) that any AI coding agent can use. Zero runtime overhead — no persistent processes, no memory leaks.

Prerequisites

pip install cli2skill

Commands

Generate skill from CLI

# Basic — parse --help and generate SKILL.md
cli2skill generate <executable> --name <skill-name> -o ~/.claude/skills/

# Custom executable path
cli2skill generate "python my_tool.py" --name my-tool \
  --exe-path "python /full/path/my_tool.py" -o ~/.claude/skills/

# From saved help text
cli2skill generate mytool --help-file help_output.txt -o ~/.claude/skills/

# Skip subcommand parsing (faster, top-level only)
cli2skill generate gh --name github-cli --no-subcommands -o ~/.claude/skills/

Preview parsed metadata

cli2skill preview <executable>

Convert MCP server to skill

# From command
cli2skill mcp npx some-mcp-server --name my-mcp -o ~/.claude/skills/

# From Claude Code settings.json
cli2skill mcp --config ~/.claude/settings.json --server my-server --name my-mcp -o ~/.claude/skills/

# With env vars
cli2skill mcp npx tavily-mcp --name tavily --env API_KEY=xxx -o ~/.claude/skills/

When to use

  • You have an MCP server that's just "call -> return result" with no persistent state — replace it with a CLI skill to eliminate process leaks
  • You want to give your agent access to any CLI tool without writing a skill by hand
  • You're migrating away from MCP servers that accumulate zombie processes

When NOT to use

  • MCP servers that need persistent browser sessions, streaming notifications, or multi-client shared state — those genuinely need MCP

Comments

Loading comments...