Token Usage Dashboard
Analysis
This appears to be a local CodexBar usage dashboard; it uses a disclosed local CLI and writes local reports, so users should review the data it reads and the CodexBar install source.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
cmd = ["codexbar", "cost", "--format", "json", "--provider", provider] output = subprocess.check_output(cmd, text=True)
The dashboard invokes the local CodexBar CLI to obtain usage/cost data. This is central to the stated purpose and does not use a shell, but it is still local tool execution.
brew | formula: steipete/tap/codexbar | creates binaries: codexbar
The required codexbar binary is installed from an external Homebrew tap. This is disclosed and purpose-aligned, but it requires trusting that package source.
`/tmp/report_center/report_history.json` 會保存歷史版本與下載檔案路徑(JSON/CSV)。
The optional report scheduler persists report history and artifact paths. The workflow is documented and user-invoked rather than hidden background persistence.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Cost usage is local-only. It reads JSONL logs under: Codex: ~/.codex/sessions/*_/_.jsonl ... Claude: ~/.config/claude/projects/**/*.jsonl or ~/.claude/projects/**/*.jsonl
The data source is local LLM usage logs, which can reveal private usage patterns even when the skill summarizes them for costs.
