Skip to main content

Synopsis

profclaw tools <subcommand> [flags]

Description

tools provides direct access to profClaw’s built-in tool registry without going through an agent. Tools are grouped by category (file, system, git, web, memory, etc.) and each has a security level (safe, moderate, dangerous). Use tools exec to invoke any tool directly from the CLI for testing and automation.

Subcommands

SubcommandDescription
listList all registered tools grouped by category
info <name>Show detailed information and examples for a tool
exec <name>Execute a tool with JSON parameters
run <command...>Shortcut: run a shell command via the exec tool
git-statusShortcut: show git status
sysinfoShortcut: show system information
env [name]Shortcut: show environment variables
which <command>Shortcut: find a command in PATH
read <path>Shortcut: read a file
find <pattern>Shortcut: search for files by name pattern
grep <pattern> [path]Shortcut: search file contents

tools list

-c, --category
string
Filter by category (e.g., file, system, git, web, memory).
--json
boolean
Output as JSON array with name, description, category, and security level.

tools exec <name>

name
string
required
Tool name as shown in tools list.
-p, --params
string
Tool parameters as a JSON string. Must match the tool’s input schema.
-w, --workdir
string
default:"cwd"
Working directory for the tool execution context.
-y, --yes
boolean
Skip the approval prompt for moderate-security tools.
--json
boolean
Output the raw tool result as JSON.

Tool Security Levels

LevelDescriptionApproval Required
safeRead-only operationsNever
moderateWrite operations, network requestsPrompted (skip with -y)
dangerousSystem-level operationsAlways prompted

Examples

profclaw tools list