Clawdos
name: clawdos
by danzig233 · published 2026-03-22
$ claw add gh:danzig233/danzig233-clawdos---
name: clawdos
description: "Windows automation via Clawdos API: screen capture, mouse/keyboard input, window management, file-system operations, and shell command execution. Standalone CLI execution via Python script. Use when the user wants to control or inspect a Windows host remotely."
license: "MIT"
metadata:
openclaw:
version: "2.1.1"
display_name: "Windows Execution Interface for OpenClaw"
author: "DANZIG MOE"
emoji: "🐾"
python_requires: ">=3.10"
dependencies:
- "requests>=2.28.0"
requires:
env:
- "CLAWDOS_BASE_URL"
- "CLAWDOS_API_KEY"
- "CLAWDOS_TIMEOUT"
- "CLAWDOS_FS_ROOT_ID"
primaryEnv: "CLAWDOS_API_KEY"
config_schema:
base_url:
type: "string"
default: "http://127.0.0.1:17171"
description: "Clawdos Windows host service address"
api_key:
type: "string"
required: true
description: "Clawdos API key"
timeout:
type: "integer"
default: 30
description: "Request timeout in seconds"
fs_root_id:
type: "string"
description: "Sandbox root directory ID for file system operations"
---
# Clawdos
Overview
This skill exposes a CLI wrapper around the Clawdos REST API, allowing you to operate a Windows machine securely from OpenClaw via shell commands.
Instead of loading tools, use `exec` to call the standalone python script `scripts/clawdos.py`.
⚠️ SECURITY & SANDBOX MECHANISM
**File System Sandbox Protection:**
**Network Isolation:**
⚠️ AUTHORIZATION & CAPABILITY WARNINGS
This skill grants access to **powerful Windows automation capabilities**. Users must explicitly understand and authorize the following operations:
1. **Shell Command Execution** (`shell_exec`)
- Can execute arbitrary PowerShell or cmd commands on the Windows host.
- Even within the sandbox, commands can potentially modify system state, install software, or alter configurations.
- **Only use with trusted sources and explicit user approval.**
2. **File Deletion** (`fs_delete`)
- Permanently removes files and directories within the sandbox.
- No recovery mechanism exists once deleted.
- **Exercise extreme caution; confirm deletion intent before execution.**
3. **File Upload/Download** (`--file`, `--out`)
- The CLI script can read local files and upload them to the Windows host (within sandbox).
- The script can download remote files from the Windows host to the agent system.
- **Do not use with sensitive files or untrusted remote systems.**
4. **Persistent Screen/Window Monitoring**
- Visual actions (`screen_capture`, `window_list`, `window_focus`) can observe active GUI content.
- If sensitive information is visible on screen, it may be captured.
⚠️ Requirements
**This skill requires a corresponding server running on your Windows host.**
Ensure the Windows host is running `danzig233/clawdos`. The connection parameters (`CLAWDOS_BASE_URL` and `CLAWDOS_API_KEY`) must be configured via OpenClaw's skill configuration UI or environment variables, as specified in this file's metadata.
Usage
You interact with Clawdos by running the `scripts/clawdos.py` CLI using the `exec` tool. The script will automatically pick up the `CLAWDOS_BASE_URL` and `CLAWDOS_API_KEY` environment variables injected by OpenClaw.
**Basic Syntax:**
python3 ~/.nvm/versions/node/v22.22.1/lib/node_modules/openclaw/skills/clawdos/scripts/clawdos.py <action> --args '{"key":"value"}'Available Actions
#### 1. Visual Navigation & System Check
#### 2. Precise Input (Mouse & Keyboard)
*(Prioritize keyboard/shell when possible to avoid visual estimation errors)*
#### 3. File & System Operations
Operation Strategy
Operational Best Practices
Security Best Practices
Examples
**Focus MS Edge and type:**
python3 scripts/clawdos.py window_focus --args '{"processName": "msedge"}'
python3 scripts/clawdos.py type_text --args '{"text": "https://openclaw.ai\n"}'**Take a screenshot and save it locally:**
python3 scripts/clawdos.py screen_capture --out /tmp/windows_screen.png --args '{"format":"png"}'**Read a file from Windows:**
python3 scripts/clawdos.py fs_read --args '{"path": "logs/app.log"}'**Execute PowerShell on Windows:**
python3 scripts/clawdos.py shell_exec --args '{"command": "powershell", "args": ["-Command", "Get-Process"]}'More tools from the same signal band
Order food/drinks (点餐) on an Android device paired as an OpenClaw node. Uses in-app menu and cart; add goods, view cart, submit order (demo, no real payment).
Sign plugins, rotate agent credentials without losing identity, and publicly attest to plugin behavior with verifiable claims and authenticated transfers.
The philosophical layer for AI agents. Maps behavior to Spinoza's 48 affects, calculates persistence scores, and generates geometric self-reports. Give your...