Cursor Tui
v1.0.1Spawn and relay Cursor Agent's CLI (`agent` binary) as an interactive passthrough. Use when the user wants to run Cursor Agent in a directory, ask it questio...
⭐ 1· 773·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description request the ability to spawn and relay Cursor's CLI; the skill only requires the cursor / cursor-agent binaries and no unrelated credentials or installs. The declared requirements match the stated purpose.
Instruction Scope
SKILL.md stays focused on spawning a PTY background session, polling output, and relaying user input. It does instruct the agent to run the Cursor binary in an arbitrary project directory and to relay Cursor output verbatim — this is consistent with a transparent passthrough but means any sensitive output produced by Cursor will be relayed to the user.
Install Mechanism
There is no install spec (instruction-only), so nothing is downloaded or written to disk by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested. The absence of extra secrets is proportional to the skill's purpose.
Persistence & Privilege
always is false and the skill is user-invocable. Autonomous model invocation is allowed by platform default but not an additional privilege requested by the skill.
Assessment
This skill acts as a transparent proxy to a local Cursor 'agent' process — it will spawn the binary in whatever directory you specify and relay Cursor's output and permission prompts verbatim. Before using: ensure the cursor/cursor-agent binaries on your PATH are the authentic versions you trust; avoid running the agent in directories containing secrets you don't want echoed back; do not blindly accept workspace-trust or approval prompts relayed by the tool (the instructions correctly tell the skill to ask you). If you are uncomfortable with an automatic agent being spawned, don't invoke the skill or restrict autonomous invocation in your agent configuration.Like a lobster shell, security has layers — review code before you run it.
latestvk97fwx6mgahthhcmdn2dda7v6d8248vs
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binscursor, cursor-agent
