terry-camsnap

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill’s camera-snapshot purpose is clear, but it asks the agent to run an unprovided local Python script via Bash with raw arguments, so its actual behavior cannot be reviewed.

Review this skill carefully before installing. Its stated purpose is reasonable, but the actual camera-capture script is missing, so you cannot verify what will run or how output paths are restricted. Install only if you trust the publisher and can inspect or supply the referenced camsnap.py yourself.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A malformed or untrusted output path could cause unintended command behavior, and the user cannot verify the claimed path restrictions from the supplied artifacts.

Why it was flagged

The skill tells the agent to invoke Bash with user-supplied arguments inserted directly into the command. That makes safe argument handling dependent on shell parsing and the missing helper script.

Skill content
python3 ~/.openclaw/workspace/src/camsnap.py {{ $ARGUMENTS }}
Recommendation

Use a packaged, reviewed helper that receives arguments safely, or require explicit quoting/escaping and confirmation before running the Bash command.

What this means

The skill may fail, or it may run a local script whose origin and permissions are unclear.

Why it was flagged

The skill depends on a helper script under ~/.openclaw/workspace/src, but the supplied manifest contains only SKILL.md and there is no install spec, so the executable's source and behavior are not reviewable.

Skill content
Run the snapshot script:
```bash
python3 ~/.openclaw/workspace/src/camsnap.py {{ $ARGUMENTS }}
```
Recommendation

Do not install until the provider includes the camsnap.py file or a pinned, reviewable install process that creates it.

What this means

If a file exists at that path, the agent could execute unreviewed local code with the user's permissions.

Why it was flagged

The skill grants Bash use and then instructs execution of a Python file that is not included in the reviewed package. Command execution is expected for this purpose, but this specific executable is outside the provided artifacts.

Skill content
allowed-tools: Bash
Recommendation

Only allow execution of reviewed code shipped with the skill, and avoid running files from ambiguous workspace paths.

What this means

Users may assume the file-writing behavior is constrained even though that cannot be verified from this package.

Why it was flagged

The skill makes a safety claim about path validation, but the implementation that would enforce it is not included in the artifacts.

Skill content
Output paths are validated against path-traversal; only allowed directories are writable.
Recommendation

Treat the path-safety claim as unverified until the implementation is provided and reviewed.