Word Automation

v0.1.0

Automate common Word/WPS document operations on Windows via COM (read text, replace, insert, headings, headers/footers, page breaks, merge, split, export to PDF/TXT, add/replace images). Use for single-document actions (no batch).

9· 6.8k·31 current·34 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md, and the bundled Python script all consistently implement Word/WPS automation via pywin32 COM. One minor metadata inconsistency: registry metadata lists no OS restriction while SKILL.md and the script require Windows and Word/WPS; otherwise required components (pywin32, Word/WPS) are proportional to the stated purpose.
Instruction Scope
SKILL.md instructs the agent to run the local Python script on specified document paths and to install pywin32. The instructions do not request unrelated files, environment variables, or outbound endpoints; they are scoped to single-document editing operations as advertised.
Install Mechanism
There is no install spec—this is instruction-only with an included script. SKILL.md asks the user to pip-install pywin32 (a reasonable, minimal dependency). No remote downloads or obscure installers are used.
Credentials
The skill declares no required environment variables or credentials and the code does not read environment secrets. Requested resources are limited to local files and a local Office application.
Persistence & Privilege
always is false and the skill does not modify other skills or global agent config. It runs locally when invoked and does not attempt to persist elevated privileges or global changes.
Assessment
This package appears coherent and implements what it claims: a local Python script that automates Word/WPS via COM. Before installing/running it: 1) ensure you run it on a Windows machine with Office or WPS and install pywin32 as instructed; 2) only open trusted documents—automatically opening untrusted Word files can trigger macros or external content and may be dangerous; 3) the skill will read and modify the files you point it at (it can overwrite outputs), so back up important documents; 4) there are no network calls or credential requests in the code, but if you have concerns, inspect the script locally or run it in a VM/sandbox first.

Like a lobster shell, security has layers — review code before you run it.

latestvk976z1crwfaqv9jq6pfg3fhshn804mb4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments