openclaw 网盘下载
OpenClaw

技能详情(站内镜像,无评论)

首页 > 技能库 > Mikrotik

通过 API 连接和管理 MikroTik RouterOS 设备。支持查看设备状态、防火墙规则、网络配置,执行自定义 RouterOS 命令。

开发与 DevOps

作者:wukefenggao @2944721178

许可证:MIT-0

MIT-0 ·免费使用、修改和重新分发。无需归因。

版本:v1.8.5

统计:⭐ 0 · 326 · 3 current installs · 3 all-time installs

0

安装量(当前) 3

🛡 VirusTotal :良性 · OpenClaw :良性

Package:2944721178/mikrotik

安全扫描(ClawHub)

  • VirusTotal :良性
  • OpenClaw :良性

OpenClaw 评估

The skill's code, instructions, and requested access are consistent with a RouterOS management/scanning tool, but it performs active network scanning, subprocess calls, and may persist credentials to a local TOOLS.md — which require cautious use and administrator approval.

目的

Name and description match the code and instructions: the package implements a MikroTik RouterOS API client, common command wrappers, CLI, and a network scanner. The requested capabilities (reading TOOLS.md, optional env vars, opening sockets to devices, and issuing RouterOS commands including admin-level operations) are coherent with a router management skill.

说明范围

SKILL.md and the code direct the agent to perform active LAN operations: enumerate local subnets, run system commands ('ip', 'hostname', 'ip neigh'), scan many IPs for open API ports (8728/8729), and attempt connections (including trying empty-password 'admin' logins for info). The instructions also describe interactive flows that save credentials to ~/.openclaw/workspace/TOOLS.md. These behaviors are within the skill's purpose but are intrusi…

安装机制

No install spec is present (no external downloads or installers). The package is delivered as code files in the skill bundle; nothing in the manifest indicates fetching arbitrary third-party archives or running remote installers. This is lower-risk from an install-mechanism perspective.

证书

The registry metadata lists no required env vars, but the code and SKILL.md read and recommend MIKROTIK_HOST / MIKROTIK_USER / MIKROTIK_PASS and also parse ~/.openclaw/workspace/TOOLS.md for credentials. Those environment variables are appropriate and expected for the stated purpose, but the mismatch with the declared registry requirements is an inconsistency. The skill also recommends storing credentials in TOOLS.md (plaintext) which is insec…

持久

always:false and normal autonomous invocation apply. The skill can persist device info/credentials into the user's workspace TOOLS.md (per SKILL.md/README statements), which is a modest persistence within the user's OpenClaw workspace and not a system-wide privilege escalation. Users should be aware credentials may be written locally if they follow the interactive setup.

综合结论

This skill appears to do what it claims (manage MikroTik devices and scan the local network), but it performs active network scanning and may attempt default/empty-password logins and write device info to ~/.openclaw/workspace/TOOLS.md. Before installing or running it: (1) get explicit permission from your network administrator; (2) avoid saving plaintext credentials in TOOLS.md — use environment variables or a secrets manager; (3) test in an …

安装(复制给龙虾 AI)

将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。

请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「Mikrotik」。简介:通过 API 连接和管理 MikroTik RouterOS 设备。支持查看设备状态、防火墙规则、网络配置,执行自定义 RouterOS 命令。。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/2944721178/mikrotik/SKILL.md
(来源:yingzhi8.cn 技能库)

SKILL.md

打开原始 SKILL.md(GitHub raw)

暂无本地缓存内容,可在后台执行详情同步。