Docx Tool

v1.0.0

使用 python-docx 库创建、读取和修改 Word 文档 (.docx)。支持文本、段落、表格、样式、图片等操作。

0· 21·1 current·1 all-time
byxiaodouzi@adtomato
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the SKILL.md examples: all instructions show how to use python-docx to create/read/modify .docx files. There are no unrelated binaries, credentials, or config paths requested.
Instruction Scope
Instructions stay within the stated purpose (file creation, reading, tables, styles, images). They do reference reading and writing local filenames (e.g., 'input.docx', 'existing.docx', 'output.docx') and recommend installing python-docx via pip; this is expected for a docx utility but means the agent or user running these examples will access workspace files—be cautious about sensitive documents.
Install Mechanism
No install spec is included in the skill bundle (instruction-only). The SKILL.md suggests 'pip install python-docx' but the skill does not automatically download or execute anything itself, which is low-risk. Users should install packages from trusted package indexes when running examples.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate to its stated functionality.
Persistence & Privilege
always is false and the skill does not request persistent or elevated platform privileges. It does not modify other skills or system settings.
Assessment
This skill is basically a how-to document for python-docx and appears coherent. Before using it: 1) ensure you install python-docx from a trusted source (pip from PyPI) in a controlled environment; 2) be aware the examples read and write local .docx files—do not run the examples against sensitive documents you do not want the agent or execution environment to access; 3) because this is instruction-only, the skill itself doesn’t execute code on install—code will run only if you or an agent actually executes the provided Python snippets. If you plan to let an autonomous agent run these examples, restrict its workspace and review any files it will access.

Like a lobster shell, security has layers — review code before you run it.

latestvk97djj381pjqhp8dsg2gjfdkhn84cvhs

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments