long-image-to-pdf

v1.0.1

Slices long images/screenshots into overlapping segments and auto-arranges them into a paginated PDF.

0· 64·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (slice long images -> PDF) align with the included script and SKILL.md. The script implements slicing, layout into pages, and PDF generation with reportlab/Pillow — all expected for this functionality.
Instruction Scope
SKILL.md instructs running the local Python script with explicit source/out-dir arguments, recommends absolute paths, and directs the agent to rely on the script's stdout for success. The instructions do not ask the agent to read unrelated files, environment variables, or send data externally.
Install Mechanism
No install spec; this is an instruction-only skill with one readable Python file. It requires standard Python packages (Pillow, reportlab) mentioned in the README. No downloads from untrusted URLs or archives are performed.
Credentials
No environment variables, credentials, or config paths are required or accessed. The script only reads the supplied image path and writes output files in the provided directory.
Persistence & Privilege
The skill does not request always:true, does not alter other skills or global agent config, and only performs file operations within the user-specified output directory. Autonomous invocation defaults are unchanged and acceptable for this purpose.
Assessment
This skill appears coherent and local-only. Before installing, ensure you have Python and the Pillow and reportlab packages installed. The script will read the source image and write slices and a PDF to the out-dir you specify; if you allow --cleanup (the skill recommends it by default) it will delete intermediate slice images. Run the script in a directory you control (to avoid clutter or permission issues). There are no network calls or credential requests, but as with any third-party script, review the code if you have concerns and do not run it on sensitive systems without inspection.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f4g35bgpmc4h3m3fc04qsxn84rnd4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments