CAD批量处理
v1.0.0提供CAD文件批量读取、文字替换、图层重命名、块属性修改和图纸自动生成等室内设计自动化处理功能。
⭐ 1· 58·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (批量读取、替换、重命名、生成DXF等) match the provided Python scripts (cad_utils.py, batch_modify.py, batch_export.py, generate_dwg.py). Required capabilities (ezdxf, optional PyPDF2/reportlab) are appropriate for the stated functionality.
Instruction Scope
SKILL.md instructs local file operations and usage of the included scripts. The runtime instructions only reference local files and expected local CAD command-line exporters; there are no instructions to read unrelated system files, environment variables, or to send data to external endpoints.
Install Mechanism
This is instruction-only (no install spec). It relies on Python and pip-installable libraries (ezdxf, optional PyPDF2/reportlab). That is reasonable; the package does not download code from arbitrary URLs. Note: batch_export.pdf suggests using local CAD CLI tools (AutoCAD/LibreCAD) but leaves conversion commands as placeholders—user must supply a suitable exporter.
Credentials
No environment variables, credentials, or config paths are requested. The scripts operate on local files only and do not attempt to access unrelated secrets or system configs.
Persistence & Privilege
Skill is not always-enabled and does not modify other skills or system-wide agent settings. It performs local file writes (overwriting DXF/PDF) which is expected for a batch-processing tool.
Assessment
This skill appears to be what it claims: local CAD batch-processing scripts using ezdxf and optional PDF libraries. Before installing/ running: 1) Review and run the code on a copy of your project (batch operations will rename/overwrite files). 2) Install dependencies from PyPI (pip install ezdxf; PyPDF2/reportlab only if you need PDF watermarking). 3) The PDF export step is a stub: you must have a local CAD tool that can export DXF→PDF and integrate the appropriate command. 4) Verify there are no unexpected network calls (the source here has none) and only run these scripts from a trusted origin. If you need higher assurance, inspect the files locally line-by-line or run in an isolated environment.Like a lobster shell, security has layers — review code before you run it.
latestvk97bm7a96g96mvfv631jt34chh84t0aj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
