Code Simplifier
v1.1.1当用户要求简化代码、重构代码、优化代码、改进代码质量时使用此技能。提供代码简化原则和最佳实践指导,确保代码符合质量标准。
⭐ 0· 403·5 current·5 all-time
bysniper-one@aqbjqtd
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (code simplification, refactoring guidance) match the provided SKILL.md, reference docs, and the included Python script that analyzes and suggests refactors. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
SKILL.md is focused on coding best-practices and tells the agent to run the bundled CLI script (python scripts/code_simplifier.py) on user-provided files and produce analysis/suggestions. The instructions only reference analyzing files the user passes and producing text/json output — no guidance to read system-wide secrets, shell history, or exfiltrate results to external endpoints.
Install Mechanism
No install spec is provided (instruction-only with an included script). The script appears to be a local AST-based analyzer; there are no downloads or archive extraction steps. The SKILL.md mentions third-party tools (radon, black, pylint) as optional tooling but does not attempt to install arbitrary remote code.
Credentials
The skill requests no environment variables, credentials, or config paths. The content includes examples referencing common developer libs (e.g., an import example that mentions OpenAI) only in documentation; there are no declared secrets or credential needs that are disproportionate to a refactoring tool.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges. It does not modify other skills' configs or system-wide settings based on the provided materials.
Assessment
This skill appears coherent and local: it analyzes code via AST and offers refactoring suggestions. Before installing or running, review the full scripts (scripts/code_simplifier.py) yourself for any unexpected imports or network/socket/subprocess calls (search for requests, socket, subprocess, os.system, urllib, http, ftplib) — the provided excerpts show only local analysis. When running against untrusted code, use a sandbox or run on a copy (the tool reads files you pass it). If you need networked features later, require explicit documentation and minimal, well-justified credentials.Like a lobster shell, security has layers — review code before you run it.
latestvk976cq9a525v3ahnar4ydhppr584cm3v
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
