Contact Book

v2.0.1

Store personal contacts with tags, search, and relationship tracking. Use when adding contacts, searching details, planning follow-ups.

2· 308·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md, and the included Bash script all align: commands create and read per-command log files in a local data directory. No extraneous credentials, binaries, or unrelated functionality are requested.
Instruction Scope
Instructions and script are scoped to local file operations and CLI behavior. The script writes/reads log files under $HOME/.local/share/contact-book and uses common shell utilities (grep, tail, wc, du, head). No network endpoints or external services are referenced. Minor implementation issues: history.log entries use a different format than the per-command logs (may make some 'since' or 'last activity' outputs show 'N/A' or malformed), and exports are not escaping quotes/newlines which can break JSON/CSV formatting — functional issues but not malicious.
Install Mechanism
No install spec and only a small shell script are included. There's no package download or archive extraction. Risk from installation is minimal; the script will be executed on demand and creates a directory under the user's home directory.
Credentials
The skill requests no environment variables, credentials, or config paths beyond writing to the user's home directory. This is proportional to a local contact-tracking tool. The script does rely on standard shell utilities being present.
Persistence & Privilege
The skill does not request 'always' presence and does not modify other skills or global agent config. It persists data only in its own data directory under the user's home.
Assessment
This is a small, local CLI tool that stores contact notes in plain-text files under ~/.local/share/contact-book. It appears coherent and contains no network calls or secret requests. Before installing or running it: (1) review or run the script to confirm behavior; (2) be aware that contact data is stored unencrypted in plain text — protect the directory (filesystem permissions, backups); (3) exported JSON/CSV may be malformed if entries contain quotes or newlines; (4) the tool will create/modify files in your home directory, so if you need isolation run it in a controlled environment or container.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dam7jpmaen8z1sgxpwcfnn1835yyr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments