Pipeworx tle

v1.0.0

Fetch and search Two-Line Element sets for satellites by NORAD ID or name, providing orbit data for tracking and analysis.

0· 33·0 current·0 all-time
byBruce Gutman@b-gutman
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description (fetch/search TLEs) matches the SKILL.md: it documents get_tle, search_satellites, and list_recent and shows example calls to an external TLE gateway. No unrelated credentials, binaries, or installs are requested.
Instruction Scope
Instructions are narrowly scoped to calling the remote MCP endpoint (https://gateway.pipeworx.io/tle/mcp) to fetch TLEs. They do not instruct reading local files or other env vars. Note: the skill sends queries to a third-party endpoint — this is expected for a network-backed lookup but is worth knowing.
Install Mechanism
There is no install spec and no code files. This is lowest-risk (instruction-only).
Credentials
No environment variables, credentials, or config paths are requested. That is proportionate to a read-only TLE lookup service.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent system-wide privileges or modify other skills. Autonomous invocation is allowed by platform default but not a separate concern here.
Assessment
This skill is internally consistent with its stated purpose (fetching/searching TLEs) and is instruction-only, but it relies on a third-party endpoint (gateway.pipeworx.io) and has no listed homepage or source repository. Before installing, consider whether you trust that external service: check the provider’s reputation or privacy policy, ensure outgoing network access to that host is acceptable, and be aware that queries (even simple NORAD IDs or names) will be sent to that server. If you need higher assurance, request the skill's source or a known homepage, or prefer a skill backed by a vetted public API or open-source implementation.

Like a lobster shell, security has layers — review code before you run it.

latestvk9714q1qrkk9s923rh618vjme984vbs0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments