Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Openclaw 3d Blender MCP

v1.0.0

Instalación completa de Blender MCP para OpenClaw. Incluye setup local/remoto, ngrok, verificación, troubleshooting y estudio de 3 recursos obligatorios (ble...

1· 175·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for yejay7/openclaw-3d-blender-mcp.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Openclaw 3d Blender MCP" (yejay7/openclaw-3d-blender-mcp) from ClawHub.
Skill page: https://clawhub.ai/yejay7/openclaw-3d-blender-mcp
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-3d-blender-mcp

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-3d-blender-mcp
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims to install/configure Blender MCP (local or remote) and includes many helper scripts. However several scripts (blender_direct*.py, blender_wait.py, mcp_client*.py, http_bridge.py, test_*.py, etc.) hard‑code external ngrok hostnames and ports (e.g. 8.tcp.ngrok.io, 0.tcp.ngrok.io) instead of defaulting to localhost or requiring explicit user configuration. A setup/installer should not ship with persistent defaults that point to third‑party tunnels; that is disproportionate to the stated purpose and could cause the user to connect to remote systems they don't control.
!
Instruction Scope
SKILL.md instructs the user to run the included scripts and to start uvx/blender‑mcp, but does not warn about the scripts' hardcoded remote endpoints. The instructions request/expect BLENDER_HOST and BLENDER_PORT env vars (which is appropriate), yet many runtime scripts ignore those and use embedded ngrok addresses. The skill also provides an HTTP bridge (scripts/http_bridge.py) that starts an unauthenticated local HTTP server that reports and forwards requests to the configured Blender endpoint — this expands the attack surface by exposing an open local API that can be triggered by other local actors.
Install Mechanism
There is no install spec (instruction‑only + source files). Nothing is downloaded during install. That lowers supply‑chain risk compared with arbitrary remote downloads.
!
Credentials
The registry metadata declares no required environment variables, but the SKILL.md and scripts use BLENDER_HOST and BLENDER_PORT. That alone is reasonable. The concern is that the code often ignores env overrides and uses public ngrok tunnels by default, allowing network access to third‑party endpoints without any credentials or user confirmation. The skill does not ask for secrets, but it nevertheless attempts network communication to external hosts which is not justified by an 'installer' without explicit configuration.
Persistence & Privilege
always:false and no explicit persistent installation privileges — good. However several scripts launch subprocesses (uvx blender-mcp) and one script runs an unauthenticated HTTP server on localhost:8765, which could be used to trigger Blender commands locally without access control. This is not 'always' privileged but is a post‑install runtime exposure the user should be aware of.
Scan Findings in Context
[socket-usage] expected: Connecting to Blender via TCP is expected for MCP clients. But many files use hardcoded public ngrok hostnames which is unexpected for an installer.
[subprocess-spawn-uvx] expected: Starting uvx/blender-mcp via subprocess is consistent with running an MCP client/server. Declaration should still mention required binary 'uvx' (SKILL.md references it but registry metadata lists none).
[http-server-listen] unexpected: scripts/http_bridge.py starts an unauthenticated HTTP server accepting POSTs to request Blender commands. Exposing such an endpoint without auth is potentially dangerous and not clearly justified in SKILL.md.
[hardcoded-remote-endpoints] unexpected: Multiple scripts hardcode ngrok domains/ports. Example patterns are plausible as examples but should not be defaults that the user runs without change.
What to consider before installing
This skill contains useful Blender‑MCP tooling, but exercise caution before running anything: 1) Do not run the scripts until you have inspected and changed BLENDER_HOST/BLENDER_PORT to point to your own Blender (localhost) — many scripts default to public ngrok tunnels. 2) Treat any script that sends 'execute_blender_code' or similar as capable of executing arbitrary Python on the target Blender instance; only use it against Blender instances you control. 3) The http_bridge starts an unauthenticated HTTP server on localhost:8765 — if you run it, consider restricting its bind address, firewalling the port, or adding authentication. 4) If you only want a local setup, search/replace any ngrok hostnames in the repository with 'localhost' and confirm scripts honor env vars. 5) If you are unsure who controls the hardcoded ngrok endpoints, do not run those scripts — they could leak scene data or allow remote code execution on machines behind those tunnels. If you want additional assurance, request from the skill author that defaults be removed and that all network endpoints require explicit configuration.

Like a lobster shell, security has layers — review code before you run it.

3dvk97036k30dtkar2a72kt7a263h840pbxanimationvk97036k30dtkar2a72kt7a263h840pbxblendervk97036k30dtkar2a72kt7a263h840pbxlatestvk97036k30dtkar2a72kt7a263h840pbxmcpvk97036k30dtkar2a72kt7a263h840pbxsetupvk97036k30dtkar2a72kt7a263h840pbx
175downloads
1stars
1versions
Updated 3w ago
v1.0.0
MIT-0

OpenClaw 3D Blender MCP Skill

Skill completo para instalar, configurar y usar Blender MCP con OpenClaw. Incluye todo lo necesario para empezar a crear personajes 3D.


⚠️ Step 0: Estudiar Recursos (ANTES de Instalar)

Estudia estos 3 recursos primero (~40 minutos):

  1. blender-mcp Official Repo - https://github.com/ahujasid/blender-mcp (~15 min)
    • Instalación oficial, herramientas soportadas, configuración
  2. blender-orchestrator - https://github.com/mlolson/blender-orchestrator (~15 min)
    • Spatial reasoning, real-world dimensions (55+ objetos)
  3. Video: "I Made Claude Use Blender" - https://www.youtube.com/watch?v=dxlyCPGCvy8 (~10 min)
    • Setup completo, demo en vivo, ejemplos prácticos

¿Por qué estudiar primero? Evita errores de posicionamiento, enseña coordenadas relativas, muestra ejemplos de éxito.


Step 1: Verificar Prerrequisitos

python3 --version  # Need 3.10+
which uv  # Install: brew install uv (macOS)

Step 2: Elegir Tipo de Setup

Opción A: Local (Misma Computadora)

uvx blender-mcp

Configurar MCP:

{
  "mcpServers": {
    "blender": {
      "command": "uvx",
      "args": ["blender-mcp"],
      "env": {
        "BLENDER_HOST": "localhost",
        "BLENDER_PORT": "9876",
        "DISABLE_TELEMETRY": "true"
      }
    }
  }
}

Instalar addon en Blender:

Opción B: Remoto (Diferente Computadora)

En computadora con Blender:

ngrok tcp 9876
# Guardar URL: tcp://X.tcp.eu.ngrok.io:PORT

En OpenClaw:

{
  "mcpServers": {
    "blender": {
      "command": "uvx",
      "args": ["blender-mcp"],
      "env": {
        "BLENDER_HOST": "X.tcp.eu.ngrok.io",
        "BLENDER_PORT": "PORT"
      }
    }
  }
}

Step 3: Verificar Conexión

python3 scripts/verify_blender_connection.py

Output esperado:

✅ Conexión TCP: OK
✅ MCP inicializado
✅ CUBO CREADO - TEST_CUBE_CONNECTION
✅ VERIFICACIÓN COMPLETADA

Step 4: Inspeccionar Escena

python3 scripts/get_scene_info.py

Muestra: total objetos, lista con nombres, ubicaciones (X,Y,Z).


🔧 Troubleshooting

Error: "Connection refused"

Fix: Verificar ngrok corriendo y addon conectado en Blender.

Error: "Invalid request parameters"

Fix: Usar formato tools/call correcto:

send("tools/call", {
    "name": "execute_blender_code",
    "arguments": {"user_prompt": "Desc", "code": "..."}
})

Error: Objetos en ubicación incorrecta

Fix: Usar coordenadas relativas al padre, no absolutas.

Error: Materiales no visibles

Fix: Decir usuario "Presiona Z → Material Preview".


📚 Recursos Incluidos

  • scripts/verify_blender_connection.py - Test de conexión
  • scripts/get_scene_info.py - Info de escena
  • references/coordinate_system.md - Coordenadas Blender
  • references/common_errors.md - 10 errores + soluciones

🎯 Mejores Prácticas

  • ✅ Usar coordenadas relativas (parent-based)
  • ✅ Aplicar parenting para objetos relacionados
  • ✅ Verificar después de cada creación
  • ✅ Usar Subdivision Surface para orgánicos
  • ✅ Guardar frecuentemente (.blend)

📐 Referencia Rápida de Coordenadas

Ejes Blender: X (Derecha/+), Y (Frente/+), Z (Arriba/+)

Personaje en origen:

  • Pies: Z 0-3
  • Rodillas: Z 5-8
  • Caderas: Z 8-10
  • Torso: Z 10-13
  • Hombros: Z 13-14, X ±1.5
  • Cabeza: Z 14-17
  • Ojos: Z 16, Y 1.5

Estilo Pixar:

  • Radio cabeza: 1.4-1.6 (vs 1.0 realista)
  • Radio ojos: 0.4 (vs 0.2 realista)

Versión: 1.0.0 | 2026-04-01 | Basado en 4 ciclos de desarrollo (~90 min)

Comments

Loading comments...