Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Compuse
v0.1.1Top-level cross-platform computer-use skill that bundles standalone macOS, Windows, and Linux runtimes with zero local Claude dependency and selects the corr...
⭐ 0· 75·0 current·0 all-time
by@wimi321
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description claim a cross-platform computer-use skill. The bundle actually contains macOS, Windows, and Linux platform projects (source and runtime helpers) and implements screenshot, mouse/keyboard, window/process enumeration, and app-listing logic — all expected for a computer‑use MCP runtime. No unrelated credentials or external services are required by the manifest.
Instruction Scope
SKILL.md instructs building and running the selected platform project and documents first-run behavior (creating a virtualenv and installing Python deps). The runtime code will access local displays, clipboard, processes, .desktop/installed-app metadata, and will drive input devices — these are within the stated purpose but are high‑sensitivity local operations. The instructions do not direct data to external endpoints, but the runtime will obtain desktop contents which an agent could forward if misused.
Install Mechanism
Registry shows no explicit install spec (skill is distributed with code included), so nothing is downloaded at install time by the platform. On first run the runtime bootstraps a Python virtualenv and pip-installs public packages from PyPI (mss, pyautogui, Pillow, psutil, python-xlib). That network activity is normal for a self-bootstrapping runtime but should be expected and reviewed. No obscure external download URLs or archive extraction from personal servers were observed in the provided metadata.
Credentials
The skill requires no credentials or special environment variables. The code reads optional orchestration env vars (e.g., CODEX_THREAD_ID, CLAUDE_COMPUTER_USE_* flags) which are appropriate for session/verbosity control. There are no unrelated API keys or secrets declared.
Persistence & Privilege
The skill will install files under the skill path (~/.codex/skills/compuse or similar) and the selected platform runtime will create a .runtime/venv on first run. always:true is not set. The skill can be invoked autonomously (default), which combined with desktop-control capabilities increases potential impact — this is expected for a computer-use MCP skill but worth user attention.
Assessment
What this means for you:
- This package appears to be what it says: a local, self‑contained computer‑use runtime that can take screenshots, list running/installed apps, and control mouse/keyboard. Those are powerful local operations — they can capture sensitive screen content and drive input devices — but they are consistent with the stated purpose.
- Before installing or enabling it: (1) only install on a machine you trust or a test machine; (2) review the included scripts (scripts/install.sh) and entry points (dist/cli.js, runtime/*_helper.py) to ensure no unexpected network endpoints or post-install steps; (3) be aware first run will create a Python virtualenv and pip-install packages from PyPI (network fetch); (4) check whether your deployment allows the agent to invoke the skill autonomously — if so, consider restricting autonomous invocation or gating actions in the MCP config; (5) if you need the least privilege, run it in an isolated VM or sandbox first and validate behavior (especially on Wayland/X11 differences).
- Additional checks that would increase confidence: verifying the upstream GitHub/ClawHub repos referenced in project/manifest.json, scanning the codebase for any outbound network calls or HTTP clients, and confirming there are no hard-coded remote endpoints or credentials in any of the truncated files.project/platforms/linux/src/lib/execFileNoThrow.ts:9
Shell command execution detected (child_process).
project/platforms/macos/dist/lib/execFileNoThrow.js:4
Shell command execution detected (child_process).
project/platforms/macos/src/lib/execFileNoThrow.ts:9
Shell command execution detected (child_process).
project/platforms/windows/src/lib/execFileNoThrow.ts:9
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
automationvk972mc23ajbdmz6htdn4ck6ebn840864computer-usevk972mc23ajbdmz6htdn4ck6ebn840864latestvk972mc23ajbdmz6htdn4ck6ebn840864linuxvk972mc23ajbdmz6htdn4ck6ebn840864macosvk972mc23ajbdmz6htdn4ck6ebn840864mcpvk972mc23ajbdmz6htdn4ck6ebn840864skillvk972mc23ajbdmz6htdn4ck6ebn840864windowsvk972mc23ajbdmz6htdn4ck6ebn840864
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
