STM32 CubeMX

v1.0.3

STM32CubeMX CLI operations for configuring pins, peripherals, DMA, interrupts, and generating code. Use cases: (1) Add/modify STM32 peripheral configuration...

0· 397·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (STM32CubeMX CLI operations) match the provided SKILL.md: it explains editing .ioc files, running the CubeMX CLI, and building with CMake. The referenced binaries (STM32CubeMX, cmake, arm-none-eabi-size) are exactly what a user performing these tasks would need.
Instruction Scope
Instructions stay within scope: they describe editing local .ioc files, invoking a local STM32CubeMX binary in headless mode with a local script, and running local build commands. There are no steps that read unrelated system files, access network endpoints, or exfiltrate secrets.
Install Mechanism
No install spec or code is included (instruction-only), so nothing is downloaded or written to disk by the skill itself. This is the lowest-risk install model and appropriate for a CLI usage guide.
Credentials
The skill requests no environment variables, credentials, or config paths. The few tool references (CubeMX, cmake, arm-none-eabi-size) are appropriate and proportional to STM32 project generation and build verification.
Persistence & Privilege
always is false and model invocation is allowed (default). The skill does not request permanent presence or elevated privileges and does not modify other skills or system configs.
Assessment
This is a local, instructional skill that assumes you have STM32CubeMX and the toolchain installed. Before using: (1) ensure the STM32CubeMX binary path you provide points to a trusted binary installed from STMicroelectronics; (2) back up your .ioc project file before automated edits; (3) be aware the headless script runs local commands and will build using your local toolchain (cmake/arm-none-eabi), so confirm those tools are the intended ones; (4) because this skill is instruction-only, risk comes from the binaries you invoke (not the skill content) — verify those binaries are from trusted sources.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cjemnkr5ekx32qzfwqdrmps81xfsf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments