S2-SP-OS Universal Indoor Air Adapter
v1.0.0S2-SP-OS Universal Indoor Air Adapter. Features LAN UDP active radar discovery, MQTT/HTTP aggregated sniffing, S2 spatial voxel wrapping (Memzero), and offli...
⭐ 0· 86·0 current·0 all-time
byMilesXiang@spacesq
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill advertises UDP discovery, MQTT/HTTP sniffing, voxel wrapping and offline linkage. The included Python implements UDP broadcast discovery, local data shaping (voxel_wrapping) and offline linkage, but it does NOT implement real MQTT or HTTP sniffing/aggregation — it returns simulated/local data. Requiring only python3 is proportionate, but the SKILL.md's claim of 'aggregated sniffing' is not implemented in the code.
Instruction Scope
Runtime instructions tell the agent to run the provided script with --mode discover or --mode read and to present results to the user. The script performs UDP broadcast discovery on the LAN (socket sendto to broadcast) and then uses simulated fetch_data for reads. The agent is correctly instructed to require user consent before reading. There is no instruction to read unrelated files or environment variables. Note: the UDP broadcast will actively scan the local subnet — expected for discovery but worth user awareness.
Install Mechanism
No install spec; this is an instruction-only skill with one bundled Python script. Nothing is downloaded from external URLs or written to disk beyond running the included script.
Credentials
No environment variables, credentials, or config paths are requested. The script operates with local network sockets and simulated device responses; requested access is proportional to its discovery/edge-processing purpose.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify other skill configurations. The script does not store tokens or alter system-wide settings.
Assessment
This skill appears to do what it says: it actively broadcasts a UDP discovery packet on your local subnet and runs local processing on returned data. Before installing or running it: (1) review the Python source (it's bundled) and run it in a trusted/isolated network or VM if you are unsure; (2) be aware discovery uses UDP broadcasts which may trigger device responses on your LAN; (3) the code uses simulated sensor reads — it does not implement actual MQTT/HTTP sniffing despite SKILL.md claims, so do not rely on it for production sniffing; (4) confirm you are comfortable granting the agent the ability to execute the script (allowed-tools: exec) and that the agent will request explicit user consent before reading device data as coded.Like a lobster shell, security has layers — review code before you run it.
latestvk97f3g99dxy6b2p6earpwh3adh83d56m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
radar Clawdis
Binspython3
