openclaw 网盘下载
OpenClaw

技能详情(站内镜像,无评论)

首页 > 技能库 > Windows Execution Interface for OpenClaw

Windows automation via Clawdos API: screen capture, mouse/keyboard input, window management, file-system operations, and shell command execution. Standalone...

开发与 DevOps

许可证:MIT-0

MIT-0 ·免费使用、修改和重新分发。无需归因。

版本:v2.1.1

统计:⭐ 1 · 230 · 0 current installs · 0 all-time installs

1

安装量(当前) 0

🛡 VirusTotal :可疑 · OpenClaw :良性

Package:danzig233/clawdos

安全扫描(ClawHub)

  • VirusTotal :可疑
  • OpenClaw :良性

OpenClaw 评估

The skill's code, runtime instructions, and required environment variables are consistent with a CLI wrapper for a remote Windows automation REST service — it is coherent but grants powerful remote-control abilities that require careful trust decisions.

目的

Name/description (Windows automation via Clawdos) match the requested items: CLAWDOS_BASE_URL, CLAWDOS_API_KEY, CLAWDOS_TIMEOUT, and CLAWDOS_FS_ROOT_ID. The included Python CLI calls the configured REST endpoints (screens, input, fs, shell_exec) and therefore legitimately needs a base URL and API key. No unrelated credentials or binaries are requested.

说明范围

SKILL.md instructs the agent to run the included scripts/clawdos.py and documents file upload (--file) and download (--out) behaviors. The instructions do not attempt to read unrelated system files or other environment variables, but they do permit the agent (when invoked with the corresponding flags) to read local files for upload and to write downloaded data to the agent filesystem — behavior that is expected for file-transfer operations but…

安装机制

No network install or third-party download is specified (instruction-only with an included Python script). The only declared dependency is requests; nothing is fetched from arbitrary URLs or extracted to disk at install time. Risk from install mechanism is low.

证书

The four required environment variables correspond directly to the skill's function: base URL, API key, request timeout, and sandbox root ID. The declared primary credential is CLAWDOS_API_KEY, which is appropriate. No unrelated secrets or multiple unrelated credentials are requested.

持久

always is false and the skill is user-invocable with normal autonomous invocation allowed. That is the platform default and acceptable here, but note the combination of autonomous invocation + ability to call shell_exec and to read local files (when passed --file) increases blast radius if the API key or server are untrusted — consider this when granting the API key and enabling autonomous use.

综合结论

This skill is internally consistent: it is a CLI wrapper for a Clawdos REST service and legitimately needs the base URL and API key. However, it provides powerful remote-control capabilities (including remote arbitrary shell execution and file transfer). Before installing/using: only configure it with an API key for a Windows host you fully trust; confirm the Clawdos server enforces the sandbox (FS_ROOT_ID) server-side; avoid using --file to u…

安装(复制给龙虾 AI)

将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。

请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「Windows Execution Interface for OpenClaw」。简介:Windows automation via Clawdos API: screen capture, mouse/keyboard input, windo…。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/danzig233/clawdos/SKILL.md
(来源:yingzhi8.cn 技能库)

SKILL.md

打开原始 SKILL.md(GitHub raw)

---
name: clawdos
description: "Windows automation via Clawdos API: screen capture, mouse/keyboard input, window management, file-system operations, and shell command execution. Standalone CLI execution via Python script. Use when the user wants to control or inspect a Windows host remotely."
license: "MIT"
metadata:
  openclaw:
    version: "2.1.1"
    display_name: "Windows Execution Interface for OpenClaw"
    author: "DANZIG MOE"
    emoji: "🐾"
    python_requires: ">=3.10"
    dependencies:
      - "requests>=2.28.0"
    requires:
      env:
        - "CLAWDOS_BASE_URL"
        - "CLAWDOS_API_KEY"
        - "CLAWDOS_TIMEOUT"
        - "CLAWDOS_FS_ROOT_ID"
    primaryEnv: "CLAWDOS_API_KEY"
    config_schema:
      base_url:
        type: "string"
        default: "http://127.0.0.1:17171"
        description: "Clawdos Windows host service address"
      api_key:
        type: "string"
        required: true
        description: "Clawdos API key"
      timeout:
        type: "integer"
        default: 30
        description: "Request timeout in seconds"
      fs_root_id:
        type: "string"
        description: "Sandbox root directory ID for file system operations"
---

# Clawdos

## Overview

This skill exposes a CLI wrapper around the Clawdos REST API, allowing you to operate a Windows machine securely from OpenClaw via shell commands.
Instead of loading tools, use `exec` to call the standalone python script `scripts/clawdos.py`.

### ⚠️ SECURITY & SANDBOX MECHANISM

**File System Sandbox Protection:**
- All file system operations (`fs_list`, `fs_read`, `fs_write`, `fs_delete`, `fs_move`) are **restricted to a sandboxed root directory** on the Windows host.
- The sandbox root is configured via the `CLAWDOS_FS_ROOT_ID` environment variable and enforced server-side.
- **The Clawdos service prevents access to files outside the designated sandbox directory.** Path traversal attempts (e.g., `../../../`) are blocked.
- This isolation ensures that skill operations cannot accidentally or intentionally access sensitive system files, user documents, or configuration outside the permitted scope.

**Network Isolation:**
- The Clawdos service only communicates with the configured `CLAWDOS_BASE_URL` and does not establish unauthorized external connections.
- All API calls are authenticated via `CLAWDOS_API_KEY` and encrypted over HTTPS when applicable.

### ⚠️ AUTHORIZATION & CAPABILITY WARNINGS

This skill grants access to **powerful Windows automation capabilities**. Users must explicitly understand and authorize the following operations:

1. **Shell Command Execution** (`shell_exec`)
   - Can execute arbitrary PowerShell or cmd commands on the Windows host.
   - Even within the sandbox, commands can potentially modify system state, install software, or alter configurations.
   - **Only use with trusted sources and explicit user approval.**

2. **File Deletion** (`fs_delete`)
   - Permanently removes files and directories within the sandbox.
   - No recovery mechanism exists once deleted.
   - **Exercise extreme caution; confirm deletion intent before execution.**

3. **File Upload/Download** (`--file`, `--out`)
   - The CLI script can read local files and upload them to the Windows host (within sandbox).
   - The script can download remote files from the Windows host to the agent system.
   - **Do not use with sensitive files or untrusted remote systems.**

4. **Persistent Screen/Window Monitoring**
   - Visual actions (`screen_capture`, `window_list`, `window_focus`) can observe active GUI content.
   - If sensitive information is visible on screen, it may be captured.

### ⚠️ Requirements
**This skill requires a corresponding server running on your Windows host.**
Ensure the Windows host is running `danzig233/clawdos`. The connection parameters (`CLAWDOS_BASE_URL` and `CLAWDOS_API_KEY`) must be configured via OpenClaw's skill configuration UI or environment variables, as specified in this file's metadata.

## Usage

You interact with Clawdos by running the `scripts/clawdos.py` CLI using the `exec` tool. The script will automatically pick up the `CLAWDOS_BASE_URL` and `CLAWDOS_API_KEY` environment variables injected by OpenClaw.

**Basic Syntax:**
```bash
python3 ~/.nvm/versions/node/v22.22.1/lib/node_modules/openclaw/skills/clawdos/scripts/clawdos.py <action> --args '{"key":"value"}'
```

### Available Actions

#### 1. Visual Navigation & System Check
- `health`: Check service status.
- `get_env`: Get screen resolution, DPI scale, and active window.
- `window_list`: List all open windows.
- `window_focus`: Focus a window. Args: `{"titleContains": "..."}` or `{"processName": "..."}`
- `screen_capture`: Take a screenshot. Use `--out path/to/save.png` to save binary. Args: `{"format": "png", "quality": 80}`

#### 2. Precise Input (Mouse & Keyboard)
*(Prioritize keyboard/shell when possible to avoid visual estimation errors)*
- `click`: Click the mouse. Args: `{"x": 100, "y": 200, "button": "left"}`
- `move`: Move cursor. Args: `{"x": 100, "y": 200}`
- `drag`: Drag mouse. Args: `{"fromX": 100, "fromY": 200, "toX": 300, "toY": 400}`
- `keys`: Press key combos. Args: `{"combo": ["ctrl", "c"]}`
- `type_text`: Type text. Args: `{"text": "hello"}`
- `scroll`: Scroll wheel. Args: `{"amount": -500}`
- `batch`: Execute multiple input actions sequentially. Args: `{"actions": [...]}`

#### 3. File & System Operations
- `fs_list`: List directory contents. Args: `{"path": "/"}`
- `fs_read`: Read a file (prints raw contents to stdout). Use `--out path/to/save.bin` to save binary files. Args: `{"path": "/hello.txt"}`
- `fs_write`: Write to a file. Args: `{"path": "/hello.txt", "content": "hello world"}`. Or use `--file path/to/local.bin` to upload a local binary file.
- `fs_mkdir`: Create a directory. Args: `{"path": "/newdir"}`
- `fs_delete`: Delete a file or directory. Args: `{"path": "/newdir", "recursive": true}`
- `fs_move`: Move or rename. Args: `{"from": "/src", "to": "/dst"}`
- `shell_exec`: Run a shell command on the Windows host. Args: `{"command": "dir", "args": ["/w"], "workingDir": ""}`

### Operation Strategy

### Operational Best Practices
- **Prefer Keyboard & Shell**: To minimize errors from visual coordinate estimation, prioritize using keyboard shortcuts (`key_combo`, `type_text`) or shell commands (`shell_exec`) over mouse operations whenever possible.
- **Targeted Mouse Usage**: Reserve precise mouse operations (`mouse_click`, `mouse_move`, `mouse_drag`) strictly for necessary UI interactions (e.g., clicking a specific button on a web page, navigating a software interface, or focusing an input field). 
- **Scrolling**: Using `mouse_scroll` is safe and recommended for navigating long pages or documents.

### Security Best Practices
- **Verify File Paths**: Always confirm the target path is within the intended sandbox directory. The server enforces isolation, but double-check paths in scripts.
- **Audit Shell Commands**: Review `shell_exec` commands before execution. Avoid running commands from untrusted sources.
- **File Transfer Restrictions**: Only upload/download files you trust. Do not use `--file` with sensitive credentials or system files.
- **Minimize Screen Captures**: Avoid capturing screens if sensitive information (passwords, tokens, personal data) may be visible.
- **Explicit Deletion Confirmation**: Review the target path carefully before executing `fs_delete`. Deleted files cannot be recovered.

## Examples

**Focus MS Edge and type:**
```bash
python3 scripts/clawdos.py window_focus --args '{"processName": "msedge"}'
python3 scripts/clawdos.py type_text --args '{"text": "https://openclaw.ain"}'
```

**Take a screenshot and save it locally:**
```bash
python3 scripts/clawdos.py screen_capture --out /tmp/windows_screen.png --args '{"format":"png"}'
```

**Read a file from Windows:**
```bash
python3 scripts/clawdos.py fs_read --args '{"path": "logs/app.log"}'
```

**Execute PowerShell on Windows:**
```bash
python3 scripts/clawdos.py shell_exec --args '{"command": "powershell", "args": ["-Command", "Get-Process"]}'
```