Indigo IPFS
v1.0.0Store and retrieve data on IPFS and query collector UTXOs for the Indigo Protocol.
⭐ 0· 194·0 current·0 all-time
byAngelos Kappos@adacapo21
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name, description, and included sub-skills (IPFS storage and collector UTXO queries) align. The skill does not request unrelated credentials, binaries, or config paths.
Instruction Scope
SKILL.md defines three clear tool-level operations (store_on_ipfs, retrieve_from_ipfs, get_collector_utxos) and example workflows. It does not instruct reading arbitrary local files or exfiltrating secrets. However the implementation of those tools and which IPFS/Cardano endpoints or nodes will be used is unspecified—so network activity is implied but not described.
Install Mechanism
No install spec and no bundled code files that would be written to disk. Instruction-only skills are lower risk from installation perspective.
Credentials
The skill declares no required environment variables or credentials. Some example workflows reference other tools (e.g., get_cdps_by_owner) which might require credentials outside this skill, but those are not requested here.
Persistence & Privilege
always:false and user-invocable:true (normal). The skill does not request to persist configuration or modify other skills.
Assessment
This skill appears coherent and minimal, but before installing check how your agent/platform implements the MCP tools (store_on_ipfs, retrieve_from_ipfs, get_collector_utxos): verify which IPFS gateway or node will be used (public gateway vs pinned storage), which Cardano node/API provides UTXO data, and whether those underlying services will require or transmit credentials. Confirm that the platform won't implicitly read or upload local files (allowed-tools include Read/Glob/Grep) without your consent. Finally, remember IPFS content is public and immutable — avoid storing secrets or private keys there.Like a lobster shell, security has layers — review code before you run it.
latestvk97eznmgjjk4hzvpj6t4ctmqy182maqw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
