Crawler Summary

vmware-workstation-cli answer-first brief

Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. --- name: vmware-workstation-cli description: Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. compatibility: Requires VMware Workstation installed with vmrun.exe accessible. Designed for Windows PowerShell environ Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.

Freshness

Last checked 4/15/2026

Best For

vmware-workstation-cli is best for either, be, run workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 94/100

vmware-workstation-cli

Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. --- name: vmware-workstation-cli description: Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. compatibility: Requires VMware Workstation installed with vmrun.exe accessible. Designed for Windows PowerShell environ

OpenClawself-declared

Public facts

4

Change events

1

Artifacts

0

Freshness

Apr 15, 2026

Verifiededitorial-contentNo verified compatibility signals

Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.

Trust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Apr 15, 2026

Vendor

Q2333gh

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.

Setup snapshot

git clone https://github.com/q2333gh/vmware_workstation_agent_skill.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Q2333gh

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB OPENCLEW

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

powershell

# Check 64-bit default location first
$vmrunPath = "C:\Program Files\VMware\VMware Workstation\vmrun.exe"
if (Test-Path $vmrunPath) {
    # Found at default 64-bit location
    # Use $vmrunPath in commands
}

# If not found, check 32-bit default location
if (-not (Test-Path $vmrunPath)) {
    $vmrunPath = "C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe"
    if (Test-Path $vmrunPath) {
        # Found at default 32-bit location
        # Use $vmrunPath in commands
    }
}

text

vmrun.exe was not found at the default installation paths:
- C:\Program Files\VMware\VMware Workstation\vmrun.exe
- C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe

Please provide the full path to vmrun.exe (e.g., C:\Apps\vmware\vmrun.exe)

powershell

# Verify user-provided path exists
$userProvidedPath = "<user_provided_path>"
if (Test-Path $userProvidedPath) {
    # Use $userProvidedPath in all vmrun commands
} else {
    # Path doesn't exist, ask user again
}

powershell

# Using full path (required - vmrun.exe is not in PATH by default)
& "<path_to_vmrun.exe>" -T ws <command> "<vmx_path>" [options]

powershell

& "<path_to_vmrun.exe>" -T ws start "<vmx_path>" nogui

powershell

& "<path_to_vmrun.exe>" -T ws list

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB OPENCLEW

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. --- name: vmware-workstation-cli description: Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. compatibility: Requires VMware Workstation installed with vmrun.exe accessible. Designed for Windows PowerShell environ

Full README

name: vmware-workstation-cli description: Control VMware Workstation virtual machines via vmrun CLI commands. Use when users need to start, stop, suspend, manage snapshots, run guest operations, or copy files between host and guest VMs. Handles Windows PowerShell execution of vmrun.exe commands. compatibility: Requires VMware Workstation installed with vmrun.exe accessible. Designed for Windows PowerShell environments. metadata: author: vmware-agent-skill version: "1.0"

VMware Workstation CLI Control

This skill enables agents to control VMware Workstation virtual machines using the vmrun command-line tool. It provides commands for VM lifecycle management, snapshot operations, guest operations, and file transfers.

When to Use

Activate this skill when users need to:

  • Start, stop, suspend, pause, or reset virtual machines
  • Manage VM snapshots (create, list, revert, delete)
  • Run programs or scripts inside guest VMs
  • Copy files between host and guest
  • Query VM status (running VMs, guest IP addresses)
  • Perform guest operations (list processes, kill processes; list/check/create/delete files or directories in guest)
  • Capture guest screen, manage shared folders, or configure host port forwarding (Windows)

Prerequisites

  • VMware Workstation must be installed
  • vmrun.exe must be accessible. Default installation locations:
    • C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe (32-bit systems)
    • C:\Program Files\VMware\VMware Workstation\vmrun.exe (64-bit systems)
    • Custom installation paths (check with search commands above)
  • Note: vmrun.exe is not automatically added to PATH by default. You can either:
    • Use the full path to vmrun.exe in commands (recommended for scripts)
    • Add VMware Workstation directory to system PATH environment variable
  • VMX file path for the target virtual machine
  • For guest operations: guest credentials (username and password)

Required: Check vmrun.exe Path First

CRITICAL: Before executing any vmrun command, you MUST first check if vmrun.exe exists at default locations. If not found, STOP execution and ask the user to provide the path.

Step 1: Check Default Paths

Before executing any vmrun command, check these default locations in order:

# Check 64-bit default location first
$vmrunPath = "C:\Program Files\VMware\VMware Workstation\vmrun.exe"
if (Test-Path $vmrunPath) {
    # Found at default 64-bit location
    # Use $vmrunPath in commands
}

# If not found, check 32-bit default location
if (-not (Test-Path $vmrunPath)) {
    $vmrunPath = "C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe"
    if (Test-Path $vmrunPath) {
        # Found at default 32-bit location
        # Use $vmrunPath in commands
    }
}

Step 2: If Not Found, STOP and Ask User

If vmrun.exe is NOT found at either default location, you MUST:

  1. STOP execution immediately
  2. DO NOT attempt to search for it automatically
  3. Ask the user to provide the full path to vmrun.exe

Example message to user:

vmrun.exe was not found at the default installation paths:
- C:\Program Files\VMware\VMware Workstation\vmrun.exe
- C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe

Please provide the full path to vmrun.exe (e.g., C:\Apps\vmware\vmrun.exe)

Step 3: Use Provided Path

Once the user provides the path, verify it exists and use it in all commands:

# Verify user-provided path exists
$userProvidedPath = "<user_provided_path>"
if (Test-Path $userProvidedPath) {
    # Use $userProvidedPath in all vmrun commands
} else {
    # Path doesn't exist, ask user again
}

Basic Usage Pattern

All commands follow this pattern:

# Using full path (required - vmrun.exe is not in PATH by default)
& "<path_to_vmrun.exe>" -T ws <command> "<vmx_path>" [options]

Replace <path_to_vmrun.exe> with:

  • The path found in Step 1 (default locations), OR
  • The path provided by the user in Step 2

Common default paths:

  • C:\Program Files\VMware\VMware Workstation\vmrun.exe (64-bit default)
  • C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe (32-bit default)

Where:

  • -T ws specifies VMware Workstation type
  • <vmx_path> is the full path to the .vmx file
  • <command> is the operation to perform

Default Behavior Guidelines

CRITICAL: Always default to soft operations for stop, suspend, and reset commands.

  • Default: Use soft for all stop, suspend, and reset operations unless:

    • User explicitly requests hard operation
    • Guest VM is unresponsive and soft operation fails
    • User specifically mentions "force" or "hard" shutdown/restart
  • Rationale: Soft operations are safer, allow graceful shutdown/preparation, prevent data loss, and properly notify the guest OS. Hard operations should only be used as a last resort.

Common Operations

VM Lifecycle

Start VM (headless):

& "<path_to_vmrun.exe>" -T ws start "<vmx_path>" nogui

List running VMs:

& "<path_to_vmrun.exe>" -T ws list

Stop VM (default: soft):

# Default: Always use soft unless user explicitly requests hard
& "<path_to_vmrun.exe>" -T ws stop "<vmx_path>" soft

Suspend VM (default: soft):

# Default: Always use soft unless user explicitly requests hard
& "<path_to_vmrun.exe>" -T ws suspend "<vmx_path>" soft

Reset VM (default: soft):

# Default: Always use soft unless user explicitly requests hard
& "<path_to_vmrun.exe>" -T ws reset "<vmx_path>" soft

Pause VM (no soft/hard):

& "<path_to_vmrun.exe>" -T ws pause "<vmx_path>"

Unpause VM:

& "<path_to_vmrun.exe>" -T ws unpause "<vmx_path>"

Snapshots

Create snapshot:

& "<path_to_vmrun.exe>" -T ws snapshot "<vmx_path>" "<snapshot_name>"

List snapshots:

& "<path_to_vmrun.exe>" -T ws listSnapshots "<vmx_path>"

Revert to snapshot:

& "<path_to_vmrun.exe>" -T ws revertToSnapshot "<vmx_path>" "<snapshot_name>"

Delete snapshot:

& "<path_to_vmrun.exe>" -T ws deleteSnapshot "<vmx_path>" "<snapshot_name>"

Guest Operations

Guest operations require credentials (-gu for username, -gp for password):

Run program in guest:

& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> runProgramInGuest "<vmx_path>" "<program_path>"

Run script in guest:

& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> runScriptInGuest "<vmx_path>" "<interpreter>" "<script>"

Getting script output from guest (workaround):

runScriptInGuest does not return guest stdout to the host; output will not appear in PowerShell. To get command/script output:

  1. Run the script in the guest with output redirected to a file (e.g. /tmp/out.txt on Linux).
  2. Copy that file from guest to host with copyFileFromGuestToHost.
  3. Read the host file to get the output. Optionally delete the guest temp file afterward.

Example (Linux guest — run command and retrieve output):

# 1. Run command in guest, redirect output to file
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> runScriptInGuest "<vmx_path>" "/bin/bash" "<command> > /tmp/guest_out.txt 2>&1"

# 2. Copy file from guest to host
& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> copyFileFromGuestToHost "<vmx_path>" "/tmp/guest_out.txt" "<host_path>"

# 3. Read output on host
Get-Content "<host_path>"

Replace <command> with the actual command (e.g. ls ~, whoami). Use a unique temp path if running multiple commands.

List processes in guest:

& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> listProcessesInGuest "<vmx_path>"

Kill process in guest:

& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> killProcessInGuest "<vmx_path>" <pid>

File Operations

Copy file from host to guest:

& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> copyFileFromHostToGuest "<vmx_path>" "<host_path>" "<guest_path>"

Copy file from guest to host:

& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> copyFileFromGuestToHost "<vmx_path>" "<guest_path>" "<host_path>"

Guest file/directory operations (require -gu -gp):

  • fileExistsInGuest — check if file exists in guest: … fileExistsInGuest "<vmx_path>" "<guest_file_path>"
  • directoryExistsInGuest — check if directory exists: … directoryExistsInGuest "<vmx_path>" "<guest_dir_path>"
  • listDirectoryInGuest — list contents of a directory: … listDirectoryInGuest "<vmx_path>" "<guest_dir_path>"
  • createTempfileInGuest — create temp file in guest, returns path: … createTempfileInGuest "<vmx_path>"
  • deleteFileInGuest — delete file in guest: … deleteFileInGuest "<vmx_path>" "<guest_file_path>"
  • createDirectoryInGuest — create directory: … createDirectoryInGuest "<vmx_path>" "<guest_dir_path>"
  • deleteDirectoryInGuest — delete directory: … deleteDirectoryInGuest "<vmx_path>" "<guest_dir_path>"
  • renameFileInGuest — rename/move file: … renameFileInGuest "<vmx_path>" "<original>" "<new>"

Capture guest screen (PNG to host):

& "<path_to_vmrun.exe>" -T ws -gu <user> -gp <pass> captureScreen "<vmx_path>" "<host_output.png>"

VM Information

Get guest IP address:

& "<path_to_vmrun.exe>" -T ws getGuestIPAddress "<vmx_path>" [-wait]

The -wait flag waits for the guest to obtain an IP address if it's not yet available.

List shared folders:

# Query shared folders from VMX file (vmrun has no direct list command)
Get-Content "<vmx_path>" | Select-String -Pattern "^sharedFolder" | ForEach-Object { $_.Line }

Note: vmrun does not provide a listSharedFolders command. Shared folder information is stored in the .vmx file and can be queried by reading the file. To add/remove shared folders at runtime use addSharedFolder, removeSharedFolder, enableSharedFolders, disableSharedFolders, setSharedFolderState (see COMMANDS.md).

Linux shared folder permissions (non-root access)

On Linux guests (e.g. Ubuntu), VMware shared folders are mounted via FUSE. To allow normal users (not just root) to freely read and write under /mnt/hgfs:

  1. Enable allow_other in FUSE config (once per VM image):

    Edit /etc/fuse.conf inside the guest and ensure this line is present (uncommented):

    user_allow_other
    
  2. Use allow_other + uid/gid in /etc/fstab:

    For modern Ubuntu with open-vm-tools, a typical entry to mount all shared folders is:

    .host:/ /mnt/hgfs fuse.vmhgfs-fuse uid=1000,gid=1000,allow_other,defaults,nofail 0 0
    
    • uid / gid: set ownership to the normal user (check with id).
    • allow_other: lets other users (not just the mounter) access the FS.
    • nofail: VM still boots even if the shared folder is unavailable.

After this, the normal user can run ls -la /mnt/hgfs and read/write shared files without sudo.

Finding VMX Files

To locate VMX files in a directory:

Get-ChildItem -LiteralPath "<vm_directory>" -Filter *.vmx | Select-Object -First 5 FullName

Important Notes

  1. vmrun.exe Path Validation (REQUIRED):

    • MUST check default paths first before executing any command (see "Required: Check vmrun.exe Path First" section above)
    • vmrun.exe is not automatically added to PATH by default
    • Default installation locations:
      • C:\Program Files\VMware\VMware Workstation\vmrun.exe (64-bit)
      • C:\Program Files (x86)\VMware\VMware Workstation\vmrun.exe (32-bit)
    • If not found at default paths: STOP execution and ask user to provide the full path
    • Always use full path in commands (never assume it's in PATH)
  2. VMX Path: Always use the full path to the .vmx file, enclosed in quotes if it contains spaces.

  3. Guest Credentials: Guest operations require valid credentials. Ensure VMware Tools is installed in the guest VM.

  4. PowerShell Execution: Use & operator in PowerShell to execute the command, especially when the path contains spaces.

  5. Default to Soft Operations: ALWAYS prefer soft operations by default for stop, suspend, and reset commands. Use hard only when explicitly requested by the user or when the guest is unresponsive. Soft operations are safer, allow graceful shutdown/preparation, and prevent data loss.

Limitations (vmrun cannot)

  • Create new VM — no create-VM command; use GUI, vmcli (Workstation 17+), or manual .vmx.
  • List shared folders — no listSharedFolders; query VMX for sharedFolder* (see COMMANDS.md).
  • runScriptInGuest stdout — guest stdout is not returned; redirect to file in guest, then copyFileFromGuestToHost.
  • typeKeystrokesInGuest — often fails with "Insufficient permissions" on Windows host; prefer runScriptInGuest/runProgramInGuest.

Error Handling

  • If vmrun.exe is not found at default paths: STOP execution immediately and ask the user to provide the full path to vmrun.exe. Do NOT attempt automatic search.
  • If user-provided path doesn't exist: Verify the path and ask the user to provide the correct path again.
  • If guest operations fail: Verify VMware Tools is installed and running in the guest
  • If VM operations fail: Ensure the VM is in the correct state (e.g., can't start an already running VM)

Additional vmrun features (reference)

Further commands documented in COMMANDS.md:

  • Power: pause, unpause
  • Snapshot: listSnapshots showtree, deleteSnapshot andDeleteChildren
  • Guest run options: runProgramInGuest / runScriptInGuest support -noWait, -activeWindow, -interactive
  • Shared folders: addSharedFolder, removeSharedFolder, enableSharedFolders, disableSharedFolders, setSharedFolderState
  • Host network (Windows only): listHostNetworks, listPortForwardings, setPortForwarding, deletePortForwarding
  • Guest input: typeKeystrokesInGuest (send keystrokes to guest; useful for GUI automation)
  • Devices: connectNamedDevice, disconnectNamedDevice (e.g. sound, Ethernet0, sata0:1)
  • Variables: writeVariable, readVariable (guestVar, runtimeConfig, guestEnv)
  • General: checkToolsState, upgradevm, installTools, deleteVM, clone (full/linked)

Reference

For detailed command reference and additional operations, see COMMANDS.md.

Documentation Links

  • Official vmrun documentation (PDF format, may require access)
  • Readable mirror: https://pdf4pro.com/view/using-vmrun-to-control-virtual-machines-vmware-71a573.html

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/snapshot"
curl -s "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract"
curl -s "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 5d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-17T00:58:26.039Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "either",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "be",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "run",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:either|supported|profile capability:be|supported|profile capability:run|supported|profile"
}

Facts JSON

[
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Q2333gh",
    "href": "https://github.com/q2333gh/vmware_workstation_agent_skill",
    "sourceUrl": "https://github.com/q2333gh/vmware_workstation_agent_skill",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T02:16:25.711Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T02:16:25.711Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/q2333gh-vmware-workstation-agent-skill/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to vmware-workstation-cli and adjacent AI workflows.