Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Intelligent shell command detector and executor for OpenClaw. Automatically identifies terminal commands (system builtins, $PATH executables, history matches...
Intelligent shell command detector and executor for OpenClaw. Automatically identifies terminal commands (system builtins, $PATH executables, history matches...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
π Smart command router that executes shell commands directly, bypassing LLM for instant terminal operations.
Terminal Killer automatically activates when user input matches command patterns. No special syntax needed β just type commands naturally: ls -la # β Direct exec git status # β Direct exec npm install # β Direct exec "help me code" # β LLM handles normally
User Input β Command Detector β Decision βββ Command β exec (direct) βββ Task β LLM (normal)
Terminal Killer automatically loads your shell environment before executing commands: Detects your shell (zsh, bash, etc.) Sources init files (~/.zshrc, ~/.bash_profile, ~/.bashrc, etc.) Inherits full PATH - including custom paths like Android SDK, Homebrew, etc. Preserves environment variables - all your export VAR=value settings This ensures commands like adb, kubectl, docker, etc. work exactly as they do in your terminal!
System Builtins - Check against OS-specific builtin commands PATH Executables - Scan $PATH for matching executables History Match - Compare against recent shell history Command Pattern - Heuristic analysis (operators, paths, etc.) Confidence Score - Combine signals for final decision
Checks input against known builtin commands for the current OS: macOS/LinuxWindows (PowerShell)Windows (CMD)cd, pwd, lscd, pwd, lscd, dir, clsecho, catecho, catecho, typemkdir, rm, cpmkdir, rm, cpmkdir, del, copygrep, findgrep, findfindstrgit, npm, nodegit, npm, nodegit, npm, node See references/builtins/ for complete lists.
Scans $PATH directories to verify if the first word is an executable: # Uses `which` (Unix) or `Get-Command` (PowerShell) which <command> # Returns path if exists
Compares input against recent shell history (~/.zsh_history, ~/.bash_history, PowerShell history): Exact match β High confidence Similar prefix β Medium confidence No match β Continue checking
Heuristic scoring based on command characteristics: PatternScoreExampleStarts with known command+3git statusContains shell operators+2`lsContains path references+2cd ~/projectsContains flags/args+1npm install --saveContains $ variables+2echo $HOMEContains redirection+2cat file > outLooks like natural language-3"please help me"Contains question marks-2"how do I...?"
Score >= 5 β EXECUTE (high confidence command) Score 3-4 β ASK (uncertain, confirm with user) Score < 3 β LLM (likely a task/request)
Terminal Killer triggers automatically when: User input starts with a verb-like word Input is short (< 20 words typically) No question words (what, how, why, etc.)
Terminal Killer automatically detects and handles interactive shell commands: Detected Patterns: adb shell - Opens new terminal with adb shell ssh user@host - Opens SSH session in new window docker exec -it container bash - Opens container shell mysql -u root -p - Opens MySQL client python, node, bash - Opens REPL in new window Behavior: β Automatically opens new Terminal window (macOS) β Loads your full shell environment (~/.zshrc, etc.) β Keeps main session free for other tasks
Force command execution: !ls -la # Force exec even if uncertain Force LLM handling: ?? explain git # Force LLM even if looks like command
Automatically flags potentially dangerous operations: rm -rf / or similar destructive patterns sudo commands (requires explicit approval) dd, mkfs, chmod 777 Network operations to suspicious hosts Commands modifying system files
Dangerous command detected! Command: rm -rf ./important-folder Risk: HIGH - Recursive delete [Approve] [Deny] [Edit]
All executed commands are logged to: ~/.openclaw/logs/terminal-killer.log Log format: { "timestamp": "2026-02-28T12:00:00Z", "command": "ls -la", "confidence": 8, "execution_time_ms": 45, "output_lines": 12, "status": "success" }
Add to your OpenClaw config: terminal-killer: enabled: true confidence_threshold: 5 require_approval_for: - "rm -rf" - "sudo" - "dd" - "mkfs" log_executions: true max_history_check: 100 # How many history entries to check
Automatically detects OS and adjusts detection rules: # Auto-detected at runtime uname -s # Darwin, Linux, etc.
See scripts/detect-command.js for the main detection logic.
scripts/check-path.js - Verify executable in PATH scripts/check-history.js - Match against shell history scripts/score-command.js - Calculate confidence score scripts/safety-check.js - Detect dangerous patterns
See references/TESTING.md for comprehensive test guide. Quick test: # Run the test suite node scripts/test-detector.js # Test specific commands node scripts/detect-command.js "ls -la" node scripts/detect-command.js "help me write code"
Requires shell access (won't work in sandboxed environments) History check needs read access to shell history files Windows support requires PowerShell or WSL for full functionality Some commands may have false positives (natural language that looks like commands)
To add new builtin commands for your platform: Edit references/builtins/<platform>.txt Test with scripts/test-detector.js Submit PR with platform verification
Author: Cosper Contact: cosperypf@163.com License: MIT
Interested in this skill? Have suggestions, bug reports, or want to collaborate? π§ Email: cosperypf@163.com π‘ Suggestions: Always welcome! π Bug Reports: Please include platform, OpenClaw version, and example inputs π€ Collaboration: Open to contributions and improvements
Built for the OpenClaw community. Thanks to everyone contributing to the ecosystem!
π― Core Improvements: β Faithful Command Execution Commands are executed exactly as input No modifications, no optimizations, no additions Raw output preserved (including progress bars, special characters, etc.) πͺ Interactive Shell Detection Automatically detects interactive commands (adb shell, ssh, docker exec -it, etc.) Opens new Terminal window for interactive sessions Keeps main session free for other tasks Loads full shell environment (~/.zshrc, etc.) π Long Output Handling Detects output longer than 2000 bytes Shows 200-character preview Prompts user to open in new Terminal window Prevents interface rendering issues with long content π¦ Files Updated: scripts/index.js - Long output detection + interactive command handling scripts/interactive.js - New Terminal window opener SKILL.md - Updated documentation README.md - Usage examples clawhub.json - Version bump to 1.1.0
Initial Release: Smart command detection (system builtins, PATH, history, patterns) Cross-platform support (macOS/Linux/Windows) Environment variable loading (~/.zshrc, etc.) Dangerous command detection Confidence scoring system Version: 1.1.0 Created: 2026-02-28 Last Updated: 2026-02-28
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.