Openai Whisper
steipete/openai-whisper
Local speech-to-text with the Whisper CLI (no API key).
Install command
brew install openai-whisper
Runtime requirements
Runtime requirements🎙️ ClawdisBinswhisper
Security scan
Security ScanVirusTotalVirusTotalBenignView report →OpenClawOpenClawBenignhigh confidenceThis is an instruction-only skill that coherently wraps the local Whisper CLI: it only asks for the whisper binary (brew install) and doesn't request extra credentials or broad system access.Details ▾✓Purpose & CapabilityName/description match the content: the SKILL.md instructs use of the 'whisper' CLI and the metadata requires the 'whisper' binary and offers a brew formula. These requirements are proportionate to a local speech-to-text skill.✓Instruction ScopeRuntime instructions are limited to calling the whisper CLI on audio files and note model caching to ~/.cache/whisper. They do not ask the agent to read unrelated files, access credentials, or transmit data to unexpected endpoints.✓Install MechanismNo install script included in the package; the metadata suggests installing via Homebrew (openai-whisper). Homebrew is a standard package mechanism and appropriate for this kind of tool.✓CredentialsThe skill declares no environment variables, no credentials, and no config paths. This matches the stated purpose (local CLI usage) and is proportionate.✓Persistence & PrivilegeThe skill is not configured as always-enabled and does not request persistent system-wide changes. Agent invocation settings are default; autonomous invocation is allowed by platform default but not a notable risk here given the limited scope.AssessmentThis skill is internally consistent and lightweight: it just tells the agent how to use a local 'whisper' binary and offers a Homebrew install hint. Before installing, verify the Homebrew formula source (brew info / inspect the tap) so you know which upstream binary will be installed. Be aware that Whisper downloads model files to ~/.cache/whisper on first run (large disk usage and network download). If you will transcribe sensitive audio, confirm the binary is trusted and run it in an environment you control; otherwise there are no extra credentials or hidden exfiltration steps in this skill.