openclaw-computer
Analysis
This is a coherent computer-control skill, but it grants broad unsandboxed desktop, file, app/process, screenshot, and recording powers that should be reviewed carefully before installation.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Provides GUI automation, file management, screenshot capture, application control, and system monitoring capabilities.
The skill intentionally exposes many high-impact local automation tools at once. The artifacts do not pair this broad capability with clear approval gates, scope limits, or containment rules.
def delete(self, path: str): ... if os.path.isdir(path): shutil.rmtree(path) else: os.remove(path)
The Python API can recursively delete any expanded user-supplied path, with no visible trash/recovery mechanism, allowlist, dry run, or confirmation step.
Source: unknown; Homepage: none; Install specifications: No install spec — this is an instruction-only skill.
For a skill with full desktop-control behavior, limited provenance and missing formal install metadata make it harder for users to verify exactly what they are installing and what dependencies are required.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
subprocess.run(["xdotool", "type", text], check=True)
Keyboard automation types into the active user session, meaning the agent can act through whatever local apps or logged-in accounts are currently open.
