System Resource Monitor
v1.0.0A clean, reliable system resource monitor for CPU load, RAM, Swap, and Disk usage. Optimized for OpenClaw.
⭐ 8· 9.2k·109 current·110 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the implementation. The skill includes a short shell script (scripts/monitor.sh) that uses standard local tools (uptime, free, df, awk, sed) to produce a system resource report — exactly what a resource monitor should do.
Instruction Scope
SKILL.md explicitly says the agent runs ./scripts/monitor.sh. The script only reads local system state via standard commands and prints formatted output. It does not read unrelated files, access environment variables, or send data to external endpoints.
Install Mechanism
No install spec or network downloads are present; the skill is instruction-only with an included script. Nothing is written to disk by an installer beyond the bundled files.
Credentials
The skill declares no required environment variables or credentials and the script does not reference any secrets or external service tokens — access requests are proportionate to the stated purpose.
Persistence & Privilege
The skill is not always-on and does not modify other skills or system configuration. It only executes a local script when invoked and does not request elevated persistent privileges.
Assessment
This skill appears safe and coherent with its stated purpose, but consider these practical checks before installing: (1) verify the included script content (scripts/monitor.sh) — it’s small and harmless as provided; (2) ensure the agent runs on a Unix-like system with uptime/free/df available (it will not work on plain Windows); (3) confirm the agent has permission to execute the script (no privilege escalation is requested); (4) because the skill source is unknown, be cautious about future updates — prefer skills from trusted sources or run in a sandbox if you need to limit exposure of system info; (5) remember the output contains system metrics and will be returned by the agent, so avoid exposing sensitive system details to untrusted recipients.Like a lobster shell, security has layers — review code before you run it.
latestvk979tk1hkpjwkznvnj5hqc9qfd811prc
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
