Chemical Structure Converter

v0.1.0

Convert between IUPAC names, SMILES strings, and molecular formulas for chemical compounds. Supports structure validation, identifier interconversion, and ch...

0· 113·0 current·0 all-time
byAIpoch@aipoch-ai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the included Python implementation and SKILL.md: a small converter/validator using an embedded compound DB. Nothing in the files asks for unrelated credentials or platform-level access.
Instruction Scope
SKILL.md and the example code operate on local data and the provided script; instructions do not request reading arbitrary user files, scanning system state, or sending data to external endpoints. It does mention optional use of external databases (PubChem, ChemSpider) as a user-facing suggestion, but the skill itself has no code that calls those services.
Install Mechanism
There is no install spec (instruction-only skill) and the only code file is a small local Python script. No downloads, external package installs, or archive extraction are present.
Credentials
The skill requests no environment variables, credentials, or configuration paths. The capabilities described do not require secrets, and none are declared or used in the code.
Persistence & Privilege
always is false and the skill does not attempt to persist or modify agent/system-wide settings. It does not require elevated privileges or permanent presence.
Assessment
This skill appears to be a small, local/mock converter suitable for quick lookups and demos. Before using in production or for large-scale cheminformatics tasks, note that: (1) the embedded database is tiny — it will miss most compounds; (2) the implementation is a simple mock and lacks chemical-accurate conversions that RDKit/OpenBabel would provide; (3) if you later add network-based lookup (PubChem/ChemSpider), verify endpoints and API keys before granting them; and (4) you may want to run the code in an isolated environment and review any future updates for added network or file-access behavior.

Like a lobster shell, security has layers — review code before you run it.

latestvk979h8bgwbrrff2cb0qmnm4mkx834jbw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments