Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

raspberry-pi-servo

v1.0.0

通过硬件PWM来控制树莓派上的舵机. 何时触发: 当需要精确控制舵机时.

0· 160·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description state hardware PWM control on Raspberry Pi. The instructions cover checking PWM kernel modules, enabling PWM via /boot/firmware/config.txt, using /sys/class/pwm, and installing a Python library—all directly relevant to that purpose.
Instruction Scope
Runtime instructions read and modify Raspberry Pi boot/config files and sysfs PWM nodes and run sudo commands to export/set PWM—these actions are expected for low-level PWM control. The guide does not instruct contacting external endpoints or reading unrelated secrets.
Install Mechanism
There is no packaged install spec; the skill directs the user to create a local virtualenv and run `pip install rpi-hardware-pwm`. This is appropriate for the functionality but carries the usual pip/package provenance risk (the package source and contents are not verified here).
Credentials
The skill requests no environment variables, credentials, or unrelated config paths. It does require elevated privileges (sudo) for specific hardware/sysfs operations, which is proportional to modifying PWM state and boot config.
Persistence & Privilege
The skill does not request permanent platform privileges (always:false) and does not modify other skills or system-wide agent settings. It only instructs editing the device's boot config (expected for enabling PWM).
Assessment
This skill is coherent for Raspberry Pi PWM/servo control, but take the usual precautions before following its steps: (1) back up /boot/firmware/config.txt (or /boot/config.txt on older OS) before editing and confirm reboots with the device owner, (2) review the PyPI package rpi-hardware-pwm source or install from a trusted repository to reduce supply-chain risk, (3) be aware that sudo commands will run as root and can affect system configuration, and (4) ensure the pin numbers and pwmchip indices used match your specific Pi model (the guide already flags Pi 5 differences). If you are uncomfortable granting sudo or editing boot config, test on a disposable device or in a safe environment first.

Like a lobster shell, security has layers — review code before you run it.

latestvk976c395vk59qtqa5gg48h2wtx8347p9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments