pty-capture作者: factory-ai

Background knowledge for droid-control workflows -- not invoked directly. Capture ground-truth byte sequences from real terminal emulators.

npx skills add https://github.com/factory-ai/factory-plugins --skill pty-capture

PTY Byte Capture

The orchestrator routed you here. Use these mechanics to execute your plan.

Capture the exact bytes a real terminal emits for a given keystroke. Use this when the question is "what sequence does terminal X send for key Y?" rather than "does the UI look right?"

Platform support

PlatformStatusRead
Linux / WaylandImplementedplatforms/linux.md
Windows (KVM)Implementedplatforms/windows.md
macOS (QEMU)Implementedplatforms/macos.md

Read the platform file for your target OS. Each contains the capture architecture, prerequisites, usage pattern, and platform-specific notes.

Known dead ends

  • Xvfb + xdotool: bypasses real keyboard processing entirely
  • uinput + Xvfb: Xvfb does not consume kernel input devices
  • SSH PTY for keystroke injection: distorts the input encoding; SSH is only for output capture or deployment

Follow-on

Feed captured bytes into terminal compatibility fixtures and replay tests in apps/cli.

NotebookLM 网页导入器

一键将网页和 YouTube 视频导入 NotebookLM。超过 200,000 用户信赖。

安装 Chrome 扩展