Synopsis
Description
tools provides direct access to profClaw’s built-in tool registry without going through an agent. Tools are grouped by category (file, system, git, web, memory, etc.) and each has a security level (safe, moderate, dangerous). Use tools exec to invoke any tool directly from the CLI for testing and automation.
Subcommands
| Subcommand | Description |
|---|---|
list | List all registered tools grouped by category |
info <name> | Show detailed information and examples for a tool |
exec <name> | Execute a tool with JSON parameters |
run <command...> | Shortcut: run a shell command via the exec tool |
git-status | Shortcut: show git status |
sysinfo | Shortcut: show system information |
env [name] | Shortcut: show environment variables |
which <command> | Shortcut: find a command in PATH |
read <path> | Shortcut: read a file |
find <pattern> | Shortcut: search for files by name pattern |
grep <pattern> [path] | Shortcut: search file contents |
tools list
Filter by category (e.g.,
file, system, git, web, memory).Output as JSON array with name, description, category, and security level.
tools exec <name>
Tool name as shown in
tools list.Tool parameters as a JSON string. Must match the tool’s input schema.
Working directory for the tool execution context.
Skip the approval prompt for moderate-security tools.
Output the raw tool result as JSON.
Tool Security Levels
| Level | Description | Approval Required |
|---|---|---|
safe | Read-only operations | Never |
moderate | Write operations, network requests | Prompted (skip with -y) |
dangerous | System-level operations | Always prompted |
Examples
Related
profclaw mcp- Manage external MCP tool serversprofclaw skills- Manage skills that use toolsprofclaw chat -a- Chat with all tools enabled