Image Ocr
v1.0.0Extract text from images using Tesseract OCR
⭐ 10· 10k·90 current·92 all-time
by@xejrax
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description claim OCR via Tesseract and the declared requirement (tesseract binary) and dnf install are appropriate. Minor inconsistency: SKILL.md examples show an image-ocr CLI wrapper (image-ocr "file") that is not supplied in the package (no code files), so the agent or user would need to call tesseract directly or provide that wrapper. The skill source/homepage is unknown which reduces traceability.
Instruction Scope
SKILL.md stays on topic: install tesseract and run OCR on image files. It does not request unrelated files, environment variables, or external endpoints. One omission: it notes multilingual support but doesn't mention installing language data packs that Tesseract may require.
Install Mechanism
Install uses the system package manager (dnf) to install the well-known tesseract package — a low-risk, standard approach. Note: no alternative install paths are provided for systems without dnf (e.g., apt/homebrew).
Credentials
No environment variables, credentials, or config paths are requested — appropriate and proportionate for an OCR-only skill.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes or access to other skills' configs. No elevated privileges are requested by the skill metadata.
Assessment
This skill is mostly coherent for doing OCR with tesseract. Before installing: (1) confirm your system uses dnf or install tesseract by another trusted method; (2) note the SKILL.md examples reference an image-ocr wrapper that is not included — the agent will need to invoke tesseract directly or you must provide a wrapper script; (3) if you need languages other than English, install the appropriate Tesseract language packs; (4) the skill source/homepage is unknown — if provenance matters, prefer a skill or package with a verifiable upstream. There are no credential or secret requests in this skill, so the security risk is low, but exercise normal caution when giving the agent filesystem access to images you consider sensitive.Like a lobster shell, security has layers — review code before you run it.
latestvk977www4w532waym2wvnycf2wx80fbzm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
👁️ Clawdis
Binstesseract
