Screengrab
v1.0.0Quick macOS display snapshot. Captures what's currently on screen without opening a browser. Saves to /tmp or a custom path. Supports multiple displays and p...
⭐ 0· 100·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name, description, SKILL.md, and the included script all consistently implement a macOS screenshot wrapper using /usr/sbin/screencapture and system_profiler. Minor metadata mismatch: registry 'Required binaries' lists none, but the README/script require the macOS 'screencapture' and use 'system_profiler'. This is an accuracy/metadata issue, not a functional mismatch.
Instruction Scope
SKILL.md instructs running the included Python script to take/list/watch screenshots. The runtime instructions and the script confine actions to invoking local system commands, writing image files, and printing paths. The script does not read unrelated user files or environment variables, nor does it transmit data externally.
Install Mechanism
No install spec — instruction-only plus a single included script. Nothing is downloaded or written during install by the skill itself, reducing installation risk.
Credentials
Skill declares no required environment variables or credentials and the script does not access secrets. It does require local system utilities (screencapture, system_profiler) which are proportional to its purpose.
Persistence & Privilege
always is false and the skill does not request persistent system-level privileges, nor does it modify other skills or global agent configuration.
Assessment
This skill simply runs the macOS screencapture tool and saves images locally. Before installing, confirm you intend to allow screenshots (they may include sensitive info) and that the host is macOS with /usr/sbin/screencapture available. Note the metadata omission: the registry did not mark required binaries even though the script needs system_profiler and screencapture. Check where files are written (default /tmp) and who can read them, and avoid running watch mode on shared/remote machines where captured images might expose secrets. If you need stricter controls, restrict who can invoke the skill or require the agent not to run it autonomously.Like a lobster shell, security has layers — review code before you run it.
latestvk979j76dqrkk5xwc3k60ran23n834ryx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
