← All skills
Tencent SkillHub Β· AI

Terminal Killer

Intelligent shell command detector and executor for OpenClaw. Automatically identifies terminal commands (system builtins, $PATH executables, history matches...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Intelligent shell command detector and executor for OpenClaw. Automatically identifies terminal commands (system builtins, $PATH executables, history matches...

⬇ 0 downloads β˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
README.md, SKILL.md, clawhub.json, references/EXAMPLES.md, references/TESTING.md, references/builtins/linux.txt

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.2.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 28 sections Open source page

Terminal Killer

πŸš€ Smart command router that executes shell commands directly, bypassing LLM for instant terminal operations.

Quick Start

Terminal Killer automatically activates when user input matches command patterns. No special syntax needed β€” just type commands naturally: ls -la # β†’ Direct exec git status # β†’ Direct exec npm install # β†’ Direct exec "help me code" # β†’ LLM handles normally

Detection Pipeline

User Input β†’ Command Detector β†’ Decision β”œβ”€β”€ Command β†’ exec (direct) └── Task β†’ LLM (normal)

Environment Loading

Terminal Killer automatically loads your shell environment before executing commands: Detects your shell (zsh, bash, etc.) Sources init files (~/.zshrc, ~/.bash_profile, ~/.bashrc, etc.) Inherits full PATH - including custom paths like Android SDK, Homebrew, etc. Preserves environment variables - all your export VAR=value settings This ensures commands like adb, kubectl, docker, etc. work exactly as they do in your terminal!

Detection Rules (in order)

System Builtins - Check against OS-specific builtin commands PATH Executables - Scan $PATH for matching executables History Match - Compare against recent shell history Command Pattern - Heuristic analysis (operators, paths, etc.) Confidence Score - Combine signals for final decision

1. System Builtins

Checks input against known builtin commands for the current OS: macOS/LinuxWindows (PowerShell)Windows (CMD)cd, pwd, lscd, pwd, lscd, dir, clsecho, catecho, catecho, typemkdir, rm, cpmkdir, rm, cpmkdir, del, copygrep, findgrep, findfindstrgit, npm, nodegit, npm, nodegit, npm, node See references/builtins/ for complete lists.

2. PATH Executable Check

Scans $PATH directories to verify if the first word is an executable: # Uses `which` (Unix) or `Get-Command` (PowerShell) which <command> # Returns path if exists

3. History Matching

Compares input against recent shell history (~/.zsh_history, ~/.bash_history, PowerShell history): Exact match β†’ High confidence Similar prefix β†’ Medium confidence No match β†’ Continue checking

4. Command Pattern Analysis

Heuristic scoring based on command characteristics: PatternScoreExampleStarts with known command+3git statusContains shell operators+2`lsContains path references+2cd ~/projectsContains flags/args+1npm install --saveContains $ variables+2echo $HOMEContains redirection+2cat file > outLooks like natural language-3"please help me"Contains question marks-2"how do I...?"

5. Confidence Threshold

Score >= 5 β†’ EXECUTE (high confidence command) Score 3-4 β†’ ASK (uncertain, confirm with user) Score < 3 β†’ LLM (likely a task/request)

Automatic Activation

Terminal Killer triggers automatically when: User input starts with a verb-like word Input is short (< 20 words typically) No question words (what, how, why, etc.)

Interactive Commands

Terminal Killer automatically detects and handles interactive shell commands: Detected Patterns: adb shell - Opens new terminal with adb shell ssh user@host - Opens SSH session in new window docker exec -it container bash - Opens container shell mysql -u root -p - Opens MySQL client python, node, bash - Opens REPL in new window Behavior: βœ… Automatically opens new Terminal window (macOS) βœ… Loads your full shell environment (~/.zshrc, etc.) βœ… Keeps main session free for other tasks

Manual Override

Force command execution: !ls -la # Force exec even if uncertain Force LLM handling: ?? explain git # Force LLM even if looks like command

Dangerous Command Detection

Automatically flags potentially dangerous operations: rm -rf / or similar destructive patterns sudo commands (requires explicit approval) dd, mkfs, chmod 777 Network operations to suspicious hosts Commands modifying system files

Approval Workflow

Dangerous command detected! Command: rm -rf ./important-folder Risk: HIGH - Recursive delete [Approve] [Deny] [Edit]

Audit Logging

All executed commands are logged to: ~/.openclaw/logs/terminal-killer.log Log format: { "timestamp": "2026-02-28T12:00:00Z", "command": "ls -la", "confidence": 8, "execution_time_ms": 45, "output_lines": 12, "status": "success" }

Settings

Add to your OpenClaw config: terminal-killer: enabled: true confidence_threshold: 5 require_approval_for: - "rm -rf" - "sudo" - "dd" - "mkfs" log_executions: true max_history_check: 100 # How many history entries to check

Platform Detection

Automatically detects OS and adjusts detection rules: # Auto-detected at runtime uname -s # Darwin, Linux, etc.

Core Script

See scripts/detect-command.js for the main detection logic.

Helper Scripts

scripts/check-path.js - Verify executable in PATH scripts/check-history.js - Match against shell history scripts/score-command.js - Calculate confidence score scripts/safety-check.js - Detect dangerous patterns

Testing

See references/TESTING.md for comprehensive test guide. Quick test: # Run the test suite node scripts/test-detector.js # Test specific commands node scripts/detect-command.js "ls -la" node scripts/detect-command.js "help me write code"

Limitations

Requires shell access (won't work in sandboxed environments) History check needs read access to shell history files Windows support requires PowerShell or WSL for full functionality Some commands may have false positives (natural language that looks like commands)

Contributing

To add new builtin commands for your platform: Edit references/builtins/<platform>.txt Test with scripts/test-detector.js Submit PR with platform verification

πŸ‘€ About the Creator

Author: Cosper Contact: cosperypf@163.com License: MIT

πŸ“¬ Get in Touch

Interested in this skill? Have suggestions, bug reports, or want to collaborate? πŸ“§ Email: cosperypf@163.com πŸ’‘ Suggestions: Always welcome! πŸ› Bug Reports: Please include platform, OpenClaw version, and example inputs 🀝 Collaboration: Open to contributions and improvements

πŸ™ Acknowledgments

Built for the OpenClaw community. Thanks to everyone contributing to the ecosystem!

v1.1.0 (2026-02-28)

🎯 Core Improvements: βœ… Faithful Command Execution Commands are executed exactly as input No modifications, no optimizations, no additions Raw output preserved (including progress bars, special characters, etc.) πŸͺŸ Interactive Shell Detection Automatically detects interactive commands (adb shell, ssh, docker exec -it, etc.) Opens new Terminal window for interactive sessions Keeps main session free for other tasks Loads full shell environment (~/.zshrc, etc.) πŸ“œ Long Output Handling Detects output longer than 2000 bytes Shows 200-character preview Prompts user to open in new Terminal window Prevents interface rendering issues with long content πŸ“¦ Files Updated: scripts/index.js - Long output detection + interactive command handling scripts/interactive.js - New Terminal window opener SKILL.md - Updated documentation README.md - Usage examples clawhub.json - Version bump to 1.1.0

v1.0.0 (2026-02-28)

Initial Release: Smart command detection (system builtins, PATH, history, patterns) Cross-platform support (macOS/Linux/Windows) Environment variable loading (~/.zshrc, etc.) Dangerous command detection Confidence scoring system Version: 1.1.0 Created: 2026-02-28 Last Updated: 2026-02-28

Category context

Agent frameworks, memory systems, reasoning layers, and model-native orchestration.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
4 Docs1 Config1 Files
  • SKILL.md Primary doc
  • README.md Docs
  • references/EXAMPLES.md Docs
  • references/TESTING.md Docs
  • clawhub.json Config
  • references/builtins/linux.txt Files