Windows Control

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill appears to do what it claims, but it gives an agent broad ability to read and operate your entire Windows desktop and logged-in apps with few built-in boundaries.

Treat this like giving the agent remote-control access to your Windows desktop. It is not showing hidden exfiltration or persistence, but it can see the screen and operate open apps as you. Use it only in a controlled session, close sensitive windows, and require confirmation before any account, file, financial, business, or destructive action.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could click the wrong button or perform high-impact actions in any open application, such as saving, submitting, accepting, or changing data.

Why it was flagged

When no window is specified, the script searches all visible windows and clicks the first matching enabled UI element. That is purpose-aligned desktop automation, but it is broad and has no built-in confirmation or app boundary.

Skill content
else:
        # Search all visible windows
        windows = desktop.windows()
...
        target['control'].click()
Recommendation

Use only in a controlled desktop session, close sensitive apps first, and require explicit user approval before clicks, typing, dialog acceptance, or destructive changes.

What this means

Actions may be taken under the user's identity in already-authenticated apps, websites, files, or business tools.

Why it was flagged

The skill intentionally operates through the user's current desktop session, which can include logged-in applications and accounts. The artifacts do not define boundaries for which apps or accounts may be controlled.

Skill content
Full Windows desktop control. Mouse, keyboard, screenshots - interact with any Windows application like a human.
Recommendation

Install only if you trust the agent with your active desktop session; consider using a separate Windows account, VM, or limited-permission environment.

What this means

Private messages, documents, credentials displayed on screen, or sensitive business data could be exposed to the agent's context.

Why it was flagged

The skill can capture the entire visible screen and return it to the agent context. This is disclosed and central to the skill, but it is broad and has no redaction or window-level restriction.

Skill content
py screenshot.py > output.b64
Returns base64 PNG of entire screen.
Recommendation

Before use, hide or close sensitive windows and prefer targeted window-reading commands over full-screen screenshots when possible.

What this means

Users have less provenance information for deciding whether to trust code that can control their desktop.

Why it was flagged

The skill's origin and setup provenance are not documented in the registry metadata, which matters more for a high-impact desktop-control skill. No malicious installer or remote download is shown.

Skill content
Source: unknown
Homepage: none
No install spec — this is an instruction-only skill.
Recommendation

Review the included scripts locally and install only from a trusted publisher or verified package source.