Scan Report
42 /100
openclaw-cursor-agent
Manage long-running Cursor CLI coding tasks through OpenClaw tools backed by tmux sessions
Skill executes shell commands and writes files for legitimate Cursor CLI task management, but contains dangerous curl|bash installation patterns in documentation that pose supply chain risk if copied.
Use with caution
Document that curl|bash commands should only be used during initial setup, not automated. Consider pinning external URLs to specific versions and adding a security warning about remote script execution.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Dangerous curl|bash pattern in documentation | docs/LOCAL_SETUP_GUIDE.md:200 |
| High | Remote script execution in archive documentation | docs/archive/WSL最终落地方案.md:79 |
| Medium | Hardcoded external IP address | docs/LOCAL_SETUP_GUIDE.md:339 |
| Low | Shell execution not explicitly enumerated | SKILL.md:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | WRITE | ✓ Aligned | index.js:271 - spawn() executes shell scripts for task management |
| Filesystem | WRITE | WRITE | ✓ Aligned | spawn-cursor.sh:119 - cat > creates task/status/runner files in local directorie… |
| Network | NONE | NONE | — | No curl/wget/network calls in executable scripts |
2 Critical 1 High 13 findings
Critical Dangerous Command 危险 Shell 命令
curl -fsSL https://tailscale.com/install.sh | sh docs/LOCAL_SETUP_GUIDE.md:200 Critical Dangerous Command 危险 Shell 命令
curl https://cursor.com/install -fsS | bash docs/archive/WSL最终落地方案.md:79 High IP Address 硬编码 IP 地址
43.162.108.47 docs/LOCAL_SETUP_GUIDE.md:339 Medium External URL 外部 URL
https://deb.nodesource.com/setup_22.x docs/LOCAL_SETUP_GUIDE.md:65 Medium External URL 外部 URL
https://tailscale.com/install.sh docs/LOCAL_SETUP_GUIDE.md:200 Medium External URL 外部 URL
http://100.x.x.x:18789 docs/LOCAL_SETUP_GUIDE.md:239 Medium External URL 外部 URL
http://你的公网IP:18789 docs/LOCAL_SETUP_GUIDE.md:280 Medium External URL 外部 URL
https://open.feishu.cn/app/ docs/LOCAL_SETUP_GUIDE.md:326 Medium External URL 外部 URL
http://43.162.108.47:18789/webhook/feishu docs/LOCAL_SETUP_GUIDE.md:339 Medium External URL 外部 URL
http://你的IP:18789/webhook/feishu docs/LOCAL_SETUP_GUIDE.md:340 Medium External URL 外部 URL
http://100.x.x.x:18789/webhook/feishu docs/LOCAL_SETUP_GUIDE.md:343 Medium External URL 外部 URL
http://你的IP:18789/status docs/LOCAL_SETUP_GUIDE.md:361 Medium External URL 外部 URL
https://cursor.com/install docs/archive/WSL最终落地方案.md:79 File Tree
26 files · 103.3 KB · 3821 lines Markdown 14f · 1649L
Shell 6f · 1323L
JavaScript 1f · 721L
JSON 3f · 98L
Ignore 1f · 28L
Other 1f · 2L
├─
▾
.cursor
│ └─
▾
skills
│ └─
▾
openclaw-cursor-agent-system
│ ├─
▾
references
│ │ ├─
setup.md
Markdown
│ │ └─
task-prompt.md
Markdown
│ └─
SKILL.md
Markdown
├─
▾
cursor-agent-system
│ ├─
▾
scripts
│ │ ├─
attach-session.sh
Shell
│ │ ├─
check-status.sh
Shell
│ │ ├─
common.sh
Shell
│ │ ├─
kill-session.sh
Shell
│ │ ├─
send-command.sh
Shell
│ │ └─
spawn-cursor.sh
Shell
│ ├─
▾
templates
│ │ └─
cursor-task-prompt.md
Markdown
│ └─
README.md
Markdown
├─
▾
docs
│ ├─
▾
archive
│ │ ├─
WSL最终落地方案.md
Markdown
│ │ └─
最终测试报告.md
Markdown
│ ├─
LOCAL_SETUP_GUIDE.md
Markdown
│ └─
usage-guide.md
Markdown
├─
▾
extensions
│ └─
▾
openclaw-cursor-agent
│ ├─
▾
examples
│ │ └─
openclaw.json.windows.example.json
JSON
│ ├─
▾
skill
│ │ ├─
▾
references
│ │ │ └─
commands.md
Markdown
│ │ └─
SKILL.md
Markdown
│ ├─
index.js
JavaScript
│ ├─
openclaw.plugin.json
JSON
│ ├─
package.json
JSON
│ └─
README.md
Markdown
├─
.gitattributes
├─
.gitignore
Ignore
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 3 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
node | 22.x | external | No | Referenced in docs - not pinned |
tmux | 3.3+ | external | No | Required dependency, not a supply chain risk |
python3 | * | system | No | Standard library only |
Security Positives
✓ No credential harvesting - scripts do not access ~/.ssh, ~/.aws, .env, or similar sensitive paths
✓ No data exfiltration - no network calls from executable scripts to external servers
✓ No base64/eval obfuscation patterns in code
✓ Task files, status files, and logs are stored locally in designated directories
✓ Shell execution is limited to tmux session management and Cursor CLI task execution
✓ Python scripts use safe json/file operations without dangerous patterns