Screenshot
v1.0.1Capture, inspect, and compare screenshots of screens, windows, regions, web pages, simulators, and CI runs with the right tool, wait strategy, viewport, and...
⭐ 29· 12.5k·153 current·161 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description claim a screenshot-capture guide and the SKILL.md contains only guidance about choosing capture tools, stabilization, masking, formats, and CI practices. It does not request unrelated permissions, binaries, or cloud credentials.
Instruction Scope
Instructions focus on capturing and validating screenshots (tool selection, waiting strategies, masking, output formats). They do not instruct reading unrelated system files, exfiltrating data, or contacting external endpoints. The guidance to mask secrets is a positive privacy consideration.
Install Mechanism
There is no install spec and no code files — the skill is purely documentation/instructional, so nothing is written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. Tool recommendations (Playwright, screencapture, grim, etc.) are reasonable for the documented use cases and are not requested as required by the skill.
Persistence & Privilege
always is false and the skill does not request persistent privileges or modify other skills. It can be invoked autonomously (the platform default), but that is normal and not accompanied by other concerning privileges.
Assessment
This skill is a safe, read-only set of instructions for taking reliable screenshots. Before you run any commands the agent suggests: (1) confirm the specific capture tool is installed on your machine (Playwright requires Node and browser installs), (2) allow screen-capture permissions only if you trust the agent/host, and (3) follow the guidance to mask or avoid capturing any secrets or personal data. Because it is instruction-only, the registry scan had nothing to analyze — that is expected, not an indication of hidden code. If you want the agent to actually run capture commands, review the exact commands first so you know which local binaries will be invoked.Like a lobster shell, security has layers — review code before you run it.
latestvk970q6femzf5sb5dnhtxymr97n82qj33
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📸 Clawdis
OSLinux · macOS · Windows
