Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. --- name: vmware-workstation-cli description: Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. compatibility: Requires VMware Workstation installed with vmrun.exe accessible. Designed for Windows PowerShell environ Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
vmware-workstation-cli is best for either, be, run workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. --- name: vmware-workstation-cli description: Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. compatibility: Requires VMware Workstation installed with vmrun.exe accessible. Designed for Windows PowerShell environ
Public facts
4
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Q2333gh
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Setup snapshot
git clone https://github.com/q2333gh/vmware_workstation_agent_skill.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Q2333gh
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
powershell
# Check 64-bit default location first
$vmrunPath = "C:\Program Files\VMware\VMware Workstation\vmrun.exe"
if (Test-Path $vmrunPath) {
# Found at default 64-bit location
# Use $vmrunPath in commands
}
# If not found, check 32-bit default location
if (-not (Test-Path $vmrunPath)) {
$vmrunPath = "C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe"
if (Test-Path $vmrunPath) {
# Found at default 32-bit location
# Use $vmrunPath in commands
}
}text
vmrun.exe was not found at the default installation paths: - C:\Program Files\VMware\VMware Workstation\vmrun.exe - C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe Please provide the full path to vmrun.exe (e.g., C:\Apps\vmware\vmrun.exe)
powershell
# Verify user-provided path exists
$userProvidedPath = "<user_provided_path>"
if (Test-Path $userProvidedPath) {
# Use $userProvidedPath in all vmrun commands
} else {
# Path doesn't exist, ask user again
}powershell
# Using full path (required - vmrun.exe is not in PATH by default) & "<path_to_vmrun.exe>" -T ws <command> "<vmx_path>" [options]
powershell
& "<path_to_vmrun.exe>" -T ws start "<vmx_path>" nogui
powershell
& "<path_to_vmrun.exe>" -T ws list
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. --- name: vmware-workstation-cli description: Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. compatibility: Requires VMware Workstation installed with vmrun.exe accessible. Designed for Windows PowerShell environ
This skill enables agents to control VMware Workstation virtual machines using the vmrun command-line tool. It provides commands for VM lifecycle management, snapshot operations, guest operations, and file transfers.
Activate this skill when users need to:
vmrun.exe must be accessible. Default installation locations:
C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe (32-bit systems)C:\Program Files\VMware\VMware Workstation\vmrun.exe (64-bit systems)vmrun.exe is not automatically added to PATH by default. You can either:
vmrun.exe in commands (recommended for scripts)CRITICAL: Before executing any vmrun command, you MUST first check if vmrun.exe exists at default locations. If not found, STOP execution and ask the user to provide the path.
Before executing any vmrun command, check these default locations in order:
# Check 64-bit default location first
$vmrunPath = "C:\Program Files\VMware\VMware Workstation\vmrun.exe"
if (Test-Path $vmrunPath) {
# Found at default 64-bit location
# Use $vmrunPath in commands
}
# If not found, check 32-bit default location
if (-not (Test-Path $vmrunPath)) {
$vmrunPath = "C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe"
if (Test-Path $vmrunPath) {
# Found at default 32-bit location
# Use $vmrunPath in commands
}
}
If vmrun.exe is NOT found at either default location, you MUST:
Example message to user:
vmrun.exe was not found at the default installation paths:
- C:\Program Files\VMware\VMware Workstation\vmrun.exe
- C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe
Please provide the full path to vmrun.exe (e.g., C:\Apps\vmware\vmrun.exe)
Once the user provides the path, verify it exists and use it in all commands:
# Verify user-provided path exists
$userProvidedPath = "<user_provided_path>"
if (Test-Path $userProvidedPath) {
# Use $userProvidedPath in all vmrun commands
} else {
# Path doesn't exist, ask user again
}
All commands follow this pattern:
# Using full path (required - vmrun.exe is not in PATH by default)
& "<path_to_vmrun.exe>" -T ws <command> "<vmx_path>" [options]
Replace <path_to_vmrun.exe> with:
Common default paths:
C:\Program Files\VMware\VMware Workstation\vmrun.exe (64-bit default)C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe (32-bit default)Where:
-T ws specifies VMware Workstation type<vmx_path> is the full path to the .vmx file<command> is the operation to performCRITICAL: Always default to soft operations for stop, suspend, and reset commands.
Default: Use soft for all stop, suspend, and reset operations unless:
hard operationRationale: Soft operations are safer, allow graceful shutdown/preparation, prevent data loss, and properly notify the guest OS. Hard operations should only be used as a last resort.
Start VM (headless):
& "<path_to_vmrun.exe>" -T ws start "<vmx_path>" nogui
List running VMs:
& "<path_to_vmrun.exe>" -T ws list
Stop VM (default: soft):
# Default: Always use soft unless user explicitly requests hard
& "<path_to_vmrun.exe>" -T ws stop "<vmx_path>" soft
Suspend VM (default: soft):
# Default: Always use soft unless user explicitly requests hard
& "<path_to_vmrun.exe>" -T ws suspend "<vmx_path>" soft
Reset VM (default: soft):
# Default: Always use soft unless user explicitly requests hard
& "<path_to_vmrun.exe>" -T ws reset "<vmx_path>" soft
Pause VM (no soft/hard):
& "<path_to_vmrun.exe>" -T ws pause "<vmx_path>"
Unpause VM:
& "<path_to_vmrun.exe>" -T ws unpause "<vmx_path>"
Create snapshot:
& "<path_to_vmrun.exe>" -T ws snapshot "<vmx_path>" "<snapshot_name>"
List snapshots:
& "<path_to_vmrun.exe>" -T ws listSnapshots "<vmx_path>"
Revert to snapshot:
& "<path_to_vmrun.exe>" -T ws revertToSnapshot "<vmx_path>" "<snapshot_name>"
Delete snapshot:
& "<path_to_vmrun.exe>" -T ws deleteSnapshot "<vmx_path>" "<snapshot_name>"
Guest operations require credentials (-gu for username, -gp for password):
Run program in guest:
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> runProgramInGuest "<vmx_path>" "<program_path>"
Run script in guest:
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> runScriptInGuest "<vmx_path>" "<interpreter>" "<script>"
Getting script output from guest (workaround):
runScriptInGuest does not return guest stdout to the host; output will not appear in PowerShell. To get command/script output:
/tmp/out.txt on Linux).copyFileFromGuestToHost.Example (Linux guest — run command and retrieve output):
# 1. Run command in guest, redirect output to file
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> runScriptInGuest "<vmx_path>" "/bin/bash" "<command> > /tmp/guest_out.txt 2>&1"
# 2. Copy file from guest to host
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> copyFileFromGuestToHost "<vmx_path>" "/tmp/guest_out.txt" "<host_path>"
# 3. Read output on host
Get-Content "<host_path>"
Replace <command> with the actual command (e.g. ls ~, whoami). Use a unique temp path if running multiple commands.
List processes in guest:
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> listProcessesInGuest "<vmx_path>"
Kill process in guest:
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> killProcessInGuest "<vmx_path>" <pid>
Copy file from host to guest:
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> copyFileFromHostToGuest "<vmx_path>" "<host_path>" "<guest_path>"
Copy file from guest to host:
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> copyFileFromGuestToHost "<vmx_path>" "<guest_path>" "<host_path>"
Guest file/directory operations (require -gu -gp):
… fileExistsInGuest "<vmx_path>" "<guest_file_path>"… directoryExistsInGuest "<vmx_path>" "<guest_dir_path>"… listDirectoryInGuest "<vmx_path>" "<guest_dir_path>"… createTempfileInGuest "<vmx_path>"… deleteFileInGuest "<vmx_path>" "<guest_file_path>"… createDirectoryInGuest "<vmx_path>" "<guest_dir_path>"… deleteDirectoryInGuest "<vmx_path>" "<guest_dir_path>"… renameFileInGuest "<vmx_path>" "<original>" "<new>"Capture guest screen (PNG to host):
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> captureScreen "<vmx_path>" "<host_output.png>"
Get guest IP address:
& "<path_to_vmrun.exe>" -T ws getGuestIPAddress "<vmx_path>" [-wait]
The -wait flag waits for the guest to obtain an IP address if it's not yet available.
List shared folders:
# Query shared folders from VMX file (vmrun has no direct list command)
Get-Content "<vmx_path>" | Select-String -Pattern "^sharedFolder" | ForEach-Object { $_.Line }
Note: vmrun does not provide a listSharedFolders command. Shared folder information is stored in the .vmx file and can be queried by reading the file. To add/remove shared folders at runtime use addSharedFolder, removeSharedFolder, enableSharedFolders, disableSharedFolders, setSharedFolderState (see COMMANDS.md).
On Linux guests (e.g. Ubuntu), VMware shared folders are mounted via FUSE. To allow normal users (not just root) to freely read and write under /mnt/hgfs:
Enable allow_other in FUSE config (once per VM image):
Edit /etc/fuse.conf inside the guest and ensure this line is present (uncommented):
user_allow_other
Use allow_other + uid/gid in /etc/fstab:
For modern Ubuntu with open-vm-tools, a typical entry to mount all shared folders is:
.host:/ /mnt/hgfs fuse.vmhgfs-fuse uid=1000,gid=1000,allow_other,defaults,nofail 0 0
uid / gid: set ownership to the normal user (check with id).allow_other: lets other users (not just the mounter) access the FS.nofail: VM still boots even if the shared folder is unavailable.After this, the normal user can run ls -la /mnt/hgfs and read/write shared files without sudo.
To locate VMX files in a directory:
Get-ChildItem -LiteralPath "<vm_directory>" -Filter *.vmx | Select-Object -First 5 FullName
vmrun.exe Path Validation (REQUIRED):
vmrun.exe is not automatically added to PATH by defaultC:\Program Files\VMware\VMware Workstation\vmrun.exe (64-bit)C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe (32-bit)VMX Path: Always use the full path to the .vmx file, enclosed in quotes if it contains spaces.
Guest Credentials: Guest operations require valid credentials. Ensure VMware Tools is installed in the guest VM.
PowerShell Execution: Use & operator in PowerShell to execute the command, especially when the path contains spaces.
Default to Soft Operations: ALWAYS prefer soft operations by default for stop, suspend, and reset commands. Use hard only when explicitly requested by the user or when the guest is unresponsive. Soft operations are safer, allow graceful shutdown/preparation, and prevent data loss.
sharedFolder* (see COMMANDS.md).vmrun.exe is not found at default paths: STOP execution immediately and ask the user to provide the full path to vmrun.exe. Do NOT attempt automatic search.Further commands documented in COMMANDS.md:
showtree, deleteSnapshot andDeleteChildren-noWait, -activeWindow, -interactiveFor detailed command reference and additional operations, see COMMANDS.md.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/snapshot"
curl -s "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract"
curl -s "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T00:58:26.039Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "either",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "be",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "run",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:either|supported|profile capability:be|supported|profile capability:run|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Q2333gh",
"href": "https://github.com/q2333gh/vmware_workstation_agent_skill",
"sourceUrl": "https://github.com/q2333gh/vmware_workstation_agent_skill",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T02:16:25.711Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T02:16:25.711Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to vmware-workstation-cli and adjacent AI workflows.