Data Retention Mapper

v1.0.0

梳理数据保留周期、落盘位置、清理责任与过期处置建议。;use for data-retention, governance, privacy workflows;do not use for 替代正式合规意见, 隐瞒敏感存储位置风险.

0· 178·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (data retention mapping) match the included resources: a template, spec, examples, and a Python script that generates structured reports or audits. The only required binary is python3, which is proportionate to the stated purpose.
Instruction Scope
SKILL.md limits the skill to read-only, reviewable outputs and instructs running the bundled script or using the templates if execution is unavailable. The included script can recursively scan directories and many file types (markdown, code, CSV, etc.) when given a directory as input — this is reasonable for audits, but it means the agent (or user) must avoid passing sensitive system paths (e.g., /, home directories with secrets) unless intended. The skill does not instruct reading unrelated environment variables or contacting external endpoints.
Install Mechanism
There is no install spec (instruction-only plus an included script). No external downloads, package installs, or third-party registries are invoked. This is low-risk from an install perspective.
Credentials
The skill requests no environment variables or credentials. The resources and script operate on local files provided as input; nothing requires access to cloud keys or unrelated secrets.
Persistence & Privilege
always is false and the skill does not request permanent platform privileges. The script can write an output file (normal for a report generator) but does not modify other skills or system-wide agent settings.
Assessment
This skill appears to do what it says: generate structured data‑retention reports from supplied inputs or local directories. Before running: (1) inspect scripts/run.py (it is bundled) if you want to confirm behavior (it only reads files and writes reports, and contains patterns to detect risky snippets), (2) avoid passing top-level or sensitive system paths as the --input to prevent accidental disclosure of unrelated files, (3) use --dry-run or run in an isolated workspace if you are testing, and (4) review any generated output before sharing externally because report contents may include snippets from scanned files. If you need to audit a live system, sanitize inputs or run the skill against a copy of the data.

Like a lobster shell, security has layers — review code before you run it.

latestvk97925p6na63728t5ftv33myp18313h6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🗄️ Clawdis
OSmacOS · Linux · Windows
Binspython3

Comments