clawshellHuman-in-the-loop security layer. Intercepts high-risk commands and requires push notification approval.
Install via ClawdBot CLI:
clawdbot install polucas/clawshellGrade Good — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Potentially destructive shell commands in tool definitions
rm -rf /Calls external URL not in known-safe list
https://pushover.net/apps/buildAI Analysis
The skill's external API calls (Pushover, Telegram) are explicitly documented for notification purposes consistent with its human-in-the-loop security function. No hidden instructions, credential harvesting, or obfuscation are present. The primary risk is the dependency on external notification services, which could expose command metadata but is user-configured and intended.
Audited Apr 16, 2026 · audit v1.0
Generated Mar 1, 2026
Integrate ClawShell into CI/CD pipelines to intercept and require approval for high-risk deployment commands like database migrations or infrastructure changes. This prevents unauthorized or accidental destructive operations in production environments, ensuring human oversight before critical actions.
Use ClawShell in financial institutions to monitor shell commands during data analysis or transaction processing. It blocks risky operations like unauthorized data exports or system modifications, requiring manager approval via push notifications to comply with regulatory standards and reduce fraud risk.
Deploy ClawShell in hospital IT systems to secure administrative tasks involving patient data or medical devices. It intercepts commands that could compromise sensitive information or disrupt critical services, enforcing approval workflows for high-risk actions to maintain HIPAA compliance and operational safety.
Implement ClawShell in university computer labs to control student access to shell commands. It allows low-risk educational activities while blocking or requiring instructor approval for potentially harmful operations like system configuration changes, protecting lab infrastructure from misuse.
Apply ClawShell to e-commerce backend systems to oversee commands related to inventory updates, payment processing, or server maintenance. It requires approval for high-risk tasks to prevent errors that could lead to downtime or data breaches, ensuring business continuity and customer trust.
Offer ClawShell as a cloud-based service with tiered pricing based on usage volume, features like custom rule sets, and support levels. Revenue is generated through monthly or annual subscriptions, targeting enterprises needing scalable security solutions without on-premise deployment overhead.
Sell perpetual licenses for on-premise installations with one-time fees and optional maintenance contracts for updates and support. This model appeals to large organizations in regulated industries like finance or healthcare that require full control over their security infrastructure and data.
Provide a free basic version of ClawShell for individual developers or small teams, with paid upgrades for advanced features such as multi-user approval workflows, integration with third-party tools, and enhanced analytics. Revenue comes from upselling premium features to growing user bases.
💬 Integration Tip
Ensure environment variables like CLAWSHELL_PUSHOVER_USER are properly configured and test with low-risk commands first to verify setup before deploying in production environments.
Scored Apr 16, 2026
Remote-control tmux sessions for interactive CLIs by sending keystrokes and scraping pane output.
Runs shell commands inside a dedicated tmux session named claw, captures, and returns the output, with safety checks for destructive commands.
Command-line tool to manage Google Workspace services including Gmail, Calendar, Drive, Sheets, Docs, Slides, Contacts, Tasks, People, Groups, and Keep.
Capture, inspect, and compare screenshots of screens, windows, regions, web pages, simulators, and CI runs with the right tool, wait strategy, viewport, and...
Automate Windows GUI interactions (mouse, keyboard, windows) using PowerShell. Use when the user needs to simulate user input on the desktop, such as moving the cursor, clicking buttons, typing text in non-web apps, or managing window states.
Official Obsidian CLI (v1.12+). Complete command-line interface for Obsidian notes, tasks, search, tags, properties, links, and more.