Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
desktop mouse
v1.0.0Local mouse control via ydotool wrapper
⭐ 3· 2.5k·1 current·1 all-time
byOğuz Haşlak@oguzhaslak
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (local mouse control) matches what the skill requires and does: it invokes a local 'molt-mouse' wrapper which in turn calls ydotool/ydotoold to control the pointer. Requested binary and optional env settings (YDOTOOL_BIN, YDOTOOL_SOCKET, MOLT_MOUSE_*) are appropriate for this purpose.
Instruction Scope
SKILL.md limits runtime actions to exec calls on the gateway that begin with 'molt-mouse ...' and enumerates specific mouse commands (move/abs/click/hold/drag). The instructions do not ask the agent to read unrelated files, exfiltrate data, or call external network endpoints.
Install Mechanism
No install spec (instruction-only) and no remote downloads. The repository includes a shell script (molt-mouse.txt) that implements the wrapper, but the skill does not perform any installation itself — this is low-risk from an install perspective.
Credentials
The skill declares no required environment variables or credentials. The implementation uses standard optional env vars (YDTOOL_BIN, YDOTOOL_SOCKET, and MOLT_MOUSE_* tuning vars) which are reasonable for configuring a local input-control tool and do not expose secrets.
Persistence & Privilege
always:false (good). However user-invocable is false while model invocation is allowed (disable-model-invocation:false), meaning the agent can call this skill autonomously (but only the model, not the end user). Because the skill controls the local mouse, autonomous invocation could let the agent interact with the user environment/UI without explicit user action — this is an operational risk to consider, though not a sign of incoherence.
Assessment
This skill appears to do exactly what it says: run a local 'molt-mouse' wrapper which uses ydotool to move/click the mouse. Before installing, verify where the 'molt-mouse' binary will come from (the package contains a shell implementation as molt-mouse.txt but does not install it automatically). Confirm you trust any agent that may invoke this skill autonomously (it can move and click your mouse). If you want tighter control, require explicit user invocation or disable model-driven invocation for this skill, and verify the molt-mouse/ydotool binaries on your system match the expected script and are not replaced by unexpected binaries.Like a lobster shell, security has layers — review code before you run it.
latestvk973g1bfmjf0c2f5w5jgvc1t5x8092q6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
