Radarr+

v0.1.7

Add and manage movies in a Radarr instance via its HTTP API (search/lookup movies, list quality profiles and root folders, add a movie by title/year or TMDB id, and trigger a search). Use when the user asks to add/request/download a movie via Radarr/Plex, or when automating Radarr-based media workflows.

7· 2.6k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's name/description align with the code: scripts talk to Radarr and optionally TMDB/OMDb/Plex and provide add/lookup/track flows. However, the registry metadata declares no required environment variables or primary credential while the scripts require RADARR_URL and RADARR_API_KEY (plus optional TMDB/OMDB/PLEX creds). That metadata mismatch is an incoherence the user should be aware of.
!
Instruction Scope
SKILL.md and the scripts instruct the agent to read environment variables, call local CLI scripts, talk to Radarr/TMDB/OMDb/Plex, download poster images, and write state files under workspace/state/radarr. Those actions are expected for a Radarr integrator. Concerns: some scripts call absolute paths (/home/vishix/.openclaw/workspace) and resolve_defaults uses a shell -lc invocation that concatenates args into a command string — this introduces fragility and a modest injection surface if untrusted inputs are ever passed through that path.
Install Mechanism
No external install/download steps are declared (instruction-only + bundled scripts). There are no remote download URLs or extract steps in the manifest, so nothing arbitrary is pulled from the network at install time. The risk here is limited to the code shipped in the skill itself.
!
Credentials
The runtime requires RADARR_URL and RADARR_API_KEY (and optionally TMDB_API_KEY, OMDB_API_KEY, PLEX_URL, PLEX_TOKEN). Those envs are proportionate to the described functionality. The problem is the registry metadata incorrectly lists no required envs/primary credential, which is misleading. Scripts also use OPENCLAW_WORKSPACE and assume secrets are loaded from ~/.openclaw/.env; these envs/paths are not declared in the registry metadata.
Persistence & Privilege
The skill is not always-enabled and does not request elevated system privileges. It writes state under workspace/state/radarr and uses its own scripts; it does not modify other skills' configs. Autonomous invocation is enabled (platform default) but not combined with other high-privilege requests.
What to consider before installing
This package appears to implement a legitimate Radarr integration, but there are a few red flags to address before installing: - Metadata vs runtime mismatch: The registry entry claims no required environment variables, yet the scripts require RADARR_URL and RADARR_API_KEY (plus optional TMDB/OMDB/PLEX creds). Treat the latter as required and do not rely on the registry metadata. Ensure you only provide the Radarr API key to skills you trust. - Secrets handling: The SKILL.md tells you to place secrets in ~/.openclaw/.env. Confirm your OpenClaw setup actually sources that file into the environment for the runtime. Store secrets securely and avoid committing .env files. - Hardcoded paths: Several scripts call absolute paths such as /home/vishix/.openclaw/workspace or run bash -lc with a concatenated command. Update those paths to your actual OpenClaw workspace before enabling the skill, or run the skill in a controlled test environment first. - Shell invocation risk: resolve_defaults uses bash -lc and builds a command by joining args into a string. Although current calls appear safe, avoid passing untrusted user input through that code path; consider patching it to use a direct exec (no shell) if you will feed user-supplied values into it. - Test before trusting: Run ./skills/radarr/scripts/check_env.py and the ping/profile/root commands against a non-production Radarr instance, inspect the state directory (workspace/state/radarr) to see what the skill writes, and confirm outbound network calls are only to your Radarr instance and the optional add-ins (TMDB, OMDb, Plex) you expect. If you can get the skill's source repository or contact the author, ask them to (1) correct the registry metadata to list required env vars, (2) remove hardcoded /home/vishix paths or make them configurable, and (3) avoid constructing shell commands with unescaped user data. Those changes would raise confidence that the skill is safe to deploy.

Like a lobster shell, security has layers — review code before you run it.

latestvk97byjsqw8te3r0f9nfm7bxktd80f2gz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments