首页龙虾技能列表 › S2-SP-OS Vision Cast — 技能工具

👁️ S2-SP-OS Vision Cast — 技能工具

v1.1.0

S2-SP-OS Vision Cast. Features a universal Protocol Sniffer (AirPlay/Chromecast/DLNA) for native casting, backed by our secure S2 ephemeral push fallback. /...

0· 120·0 当前·0 累计
by @spacesq (MilesXiang)·MIT-0
下载技能包
License
MIT-0
最后更新
2026/3/23
安全扫描
VirusTotal
无害
查看报告
OpenClaw
安全
medium confidence
The skill's code, instructions, and requested environment variables are broadly consistent with a LAN-focused casting/sniffer tool that falls back to an S2 push mechanism, but the package comes from an unknown source and the actual network push behavior and token scope are not fully visible — review token privileges and endpoints before use.
评估建议
This skill appears coherent for LAN casting: it probes local casting ports and can fall back to an S2 push mechanism. Before installing, verify the following: (1) Source/trust — the package homepage and author are unknown; confirm the vendor and review any externally hosted receiver/service docs. (2) Token scope — find out what S2_VISION_TOKEN can do (which endpoints it authorizes and whether it allows arbitrary pushes to user devices). Limit the token's privileges if possible. (3) Network behav...
详细分析 ▾
用途与能力
Name/description (protocol sniffer + secure fallback) match required binaries (python3) and env vars (S2_PRIVACY_CONSENT, S2_VISION_TOKEN). The script implements port probing of common casting ports and a fallback push; requiring a vision token for push is proportionate to the described feature.
指令范围
Runtime instructions tell the agent to run local LAN port probes and optionally push an image payload to a target device. The script enforces that targets are private LAN addresses and requires explicit S2_PRIVACY_CONSENT. The SKILL.md sometimes refers to subnets and external helper tools (pychromecast/pyatv, s2-spectrum-perception) which are outside this skill — agents may rely on other components not included here. The code provided does not show the actual network push implementation (push_secure_snapshot is a stubbed return), so the real external endpoints and data flow are not visible in the repository.
安装机制
No install spec; this is instruction + code only. No external downloads or archive extraction. The only runtime dependency is Python and the requests package (the code imports requests). Low install risk.
凭证需求
Only two environment variables are required: S2_PRIVACY_CONSENT (consent gate) and S2_VISION_TOKEN (auth token for S2 push). Both are relevant to the declared purpose. There are no unrelated credentials or config paths requested.
持久化与权限
Skill is not always-enabled and does not request persistent system/global configuration changes. It follows the normal autonomous-invocation default; no elevated privileges or modifications to other skills are requested.
安全有层次,运行前请审查代码。

License

MIT-0

可自由使用、修改和再分发,无需署名。

运行时依赖

无特殊依赖

版本

latestv1.1.02026/3/23

- Added universal protocol sniffing to discover AirPlay, Chromecast, and DLNA casting capabilities before fallback. - Improved fallback projection to use S2's secure, ephemeral (self-destructing) push when no preferred protocols are available. - Updated documentation for clear step-by-step usage, prioritizing user device compatibility and privacy. - Metadata and environment variable requirements clarified for setup and operation.

● 无害

安装命令 点击复制

官方npx clawhub@latest install s2-vision-projection
镜像加速npx clawhub@latest install s2-vision-projection --registry https://cn.clawhub-mirror.com

技能文档

Welcome to the S2 Vision Projection. Operating as a smart switchboard, this tool first acts as a Protocol Sniffer (协议嗅探器) to discover existing mainstream wireless projection capabilities (Apple AirPlay, Google Cast, Miracast). If none are preferred or found, it falls back to the reliable S2 Native Secure Push.

🧬 Core Modes / 核心模式

  • Environment Sniffer (全频段嗅探): Scans a target IP (or subnet) for open casting ports (e.g., 7000 for AirPlay, 8009 for Cast). / 扫描目标设备支持的主流无线投屏协议。
  • UPnP/DLNA Cast: Native DLNA routing for Smart TVs. / 针对传统智能电视的 DLNA 调度。
  • Secure Snapshot Push (S2 兜底): Encrypted, ephemeral frame push to S2 display nodes. / 绝对可靠的 S2 加密快照阅后即焚推送。

🤖 Instructions for AI Agents (CRITICAL)

Prerequisite: export S2_PRIVACY_CONSENT=1 and S2_VISION_TOKEN

Step 1: Sniff the Target Display / 步骤 1:嗅探目标显示器 ALWAYS run this first to respect user's existing hardware ecosystem. / 永远优先运行此步骤以尊重用户现有的硬件生态。 ```bash python3 vision_cast.py --mode sniff --target-ip 192.168.1.55

Step 2: Act on Sniff Results / 步骤 2:根据嗅探结果决策 Ask the user if they want to use the detected native protocol (e.g., AirPlay). If they agree, or if none are found, use Step 3.

Step 3: Execute Projection / 步骤 3:执行投屏 Bash

# S2 Fallback Push python3 vision_cast.py --mode snapshot_push --target-ip 192.168.1.55 --payload "/tmp/s2_alert.jpg"

数据来源:ClawHub ↗ · 中文优化:龙虾技能库
OpenClaw 技能定制 / 插件定制 / 私有工作流定制

免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制

了解定制服务