slack-power-tools
Advanced Slack automation beyond basic messaging. Use when user needs to manage channels (create, archive, invite users), schedule messages, upload files, search workspace, manage user groups, set status/DND, get analytics, or automate Slack workflows. Covers channel ops, user management, scheduled messages, file uploads, search, and workspace analytics.
Install via CLI (Recommended)
clawhub install openclaw/skills/skills/spclaudehome/slack-power-toolsSlack Power Tools
Advanced Slack automation via Slack Web API. Requires a Slack Bot Token with appropriate scopes.
Prerequisites
export SLACK_BOT_TOKEN="xoxb-your-token"
Required OAuth scopes depend on features used (see each section).
Channel Management
Scopes: channels:manage, channels:read, groups:write, groups:read
List all channels
curl -s -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
"https://slack.com/api/conversations.list?types=public_channel,private_channel&limit=200" | jq '.channels[] | {id, name, num_members, is_archived}'
Create a channel
curl -s -X POST -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
-H "Content-Type: application/json" \
-d '{"name": "new-channel", "is_private": false}' \
"https://slack.com/api/conversations.create" | jq '.'
Archive a channel
curl -s -X POST -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
-H "Content-Type: application/json" \
-d '{"channel": "C123456"}' \
"https://slack.com/api/conversations.archive"
Set channel topic/purpose
curl -s -X POST -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
-H "Content-Type: application/json" \
-d '{"channel": "C123456", "topic": "Project X Discussion"}' \
"https://slack.com/api/conversations.setTopic"
curl -s -X POST -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
-H "Content-Type: application/json" \
-d '{"channel": "C123456", "purpose": "All things Project X"}' \
"https://slack.com/api/conversations.setPurpose"
Invite users to channel
curl -s -X POST -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
-H "Content-Type: application/json" \
-d '{"channel": "C123456", "users": "U111,U222,U333"}' \
"https://slack.com/api/conversations.invite"
Kick user from channel
curl -s -X POST -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
-H "Content-Type: application/json" \
-d '{"channel": "C123456", "user": "U111"}' \
"https://slack.com/api/conversations.kick"
Scheduled Messages
Scopes: chat:write
Schedule a message
# post_at is Unix timestamp
curl -s -X POST -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"channel": "C123456",
"text": "Reminder: Team standup in 15 minutes!",
"post_at": 1735689600
}' \
"https://slack.com/api/chat.scheduleMessage" | jq '.'
List scheduled messages
curl -s -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
"https://slack.com/api/chat.scheduledMessages.list" | jq '.scheduled_messages[]'
Delete scheduled message
curl -s -X POST -H "Authorization: Bearer $SLACK_BOT_TOKEN" \
-H "Content-Type: application/json" \
-d '{"channel": "C123456", "scheduled_message_id": "Q123456"}' \
"https://slack.com/api/chat.deleteScheduledMessage"
File Management
Scopes: files:write, files:read
Metadata
Not sure this is the right skill?
Describe what you want to build — we'll match you to the best skill from 16,000+ options.
Find the right skillPaste this into your clawhub.json to enable this plugin.
{
"plugins": {
"official-spclaudehome-slack-power-tools": {
"enabled": true,
"auto_update": true
}
}
}Related Skills
crabnet
Interact with the CrabNet cross-agent collaboration registry. Use when discovering other agents' capabilities, registering your own capabilities, posting tasks for other agents, claiming/delivering work, or searching for agents who can help with specific skills. Enables agent-to-agent collaboration and task exchange.
skill-vetter
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
aws-security-scanner
Scan AWS accounts for security misconfigurations and vulnerabilities. Use when user asks to audit AWS security, check for misconfigurations, find exposed S3 buckets, review IAM policies, check security groups, audit CloudTrail, or run AWS security checks. Covers S3, IAM, EC2, RDS, CloudTrail, and common CIS benchmarks.