Clean Filename

v1.0.0

Removes invalid characters and normalizes filenames for safe, cross-platform use in files and directories, with optional recursive cleaning.

0· 12·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the provided Python CLI (tool.py). Required capabilities are minimal and consistent: removing invalid characters, normalizing names, handling reserved Windows names, optional recursion and dry-run. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md usage examples match tool.py behavior (single file, directory, recursive, dry-run). The runtime instructions and code only operate on the filesystem paths the user supplies, skip hidden files/dirs, and print/rename as expected. Note: the tool performs in-place renames, so it will modify user files when not using --dry-run.
Install Mechanism
No install spec or external downloads; the implementation is included as a local Python script. There are no network calls, URL downloads, archives, or package installs in the package.
Credentials
No environment variables, credentials, or external service access are requested or used by the code. The script only reads the filesystem paths provided as arguments.
Persistence & Privilege
The skill is not force-installed (always: false) and does not request elevated platform privileges, but it does modify the filesystem by renaming files. Autonomous invocation is allowed by default (normal for skills); if you let an agent run this skill, it can rename any paths the agent is instructed to process.
Assessment
This skill appears coherent and limited to filename normalization. Before running it: (1) review the included tool.py (already provided) if you want to confirm behavior; (2) run with --dry-run first to verify changes; (3) test on a small sample directory or backup important files; (4) be cautious when giving recursive paths to avoid mass renames; and (5) ensure the agent only runs this on directories you intend to modify. There are no network calls or requested credentials in the package.

Like a lobster shell, security has layers — review code before you run it.

latestvk973gt0nw5w8g32hg07kne2j6h8510h7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments