Actuator
v1.0.0Actuator selection and sizing calculator
⭐ 0· 95·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (actuator selection and sizing) match the included script and commands. The skill only manages local entries, config, exports and stats — nothing requested or included is out of scope for that purpose.
Instruction Scope
SKILL.md instructs the agent to run the bundled bash script with specific commands. The script only reads/writes files under DATA_DIR (default ~/.actuator) and operates on its own data files (data.jsonl, config.txt). It does not reference other system paths, network endpoints, or other credentials.
Install Mechanism
No install spec — instruction-only with a bundled script. No downloads, package installs, or archive extraction are present.
Credentials
No required environment variables or credentials. The script optionally honors ACTUATOR_DIR to override the data directory, which is reasonable for a local data-store tool.
Persistence & Privilege
always is false and the skill does not request elevated privileges or modify other skills or system-wide configurations. It creates/manipulates only its own data directory.
Assessment
This skill is locally focused and appears coherent with its description. Before installing: (1) be aware it stores data unencrypted in ~/.actuator (or ACTUATOR_DIR if set) — avoid storing secrets there; (2) the script parses JSON via simple grep/cut which may fail on embedded quotes or complex values — review entries for correctness; (3) it has no network behavior and requests no credentials, so risk is limited to local file access; (4) if you run agents with autonomous skill invocation enabled, this skill can be executed by the agent but it has no external exfiltration capability. If you need stronger guarantees, inspect and run the script locally or run it in a restricted environment before enabling in an automated agent.Like a lobster shell, security has layers — review code before you run it.
latestvk97b6g9138q4z52qe1bw9ekw15839kbz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
