Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Regexr

v2.0.0

Create, test, and learn regular expressions with live matching. Use when validating patterns, checking groups, generating regex, linting syntax.

0· 243·2 current·2 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for bytesagain-lab/regexr.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Regexr" (bytesagain-lab/regexr) from ClawHub.
Skill page: https://clawhub.ai/bytesagain-lab/regexr
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install regexr

ClawHub CLI

Package manager switcher

npx clawhub@latest install regexr
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the implemented behavior: a CLI regex tool that validates, explains, lints, converts, previews and logs patterns. No unrelated env vars, binaries, or config paths are required.
Instruction Scope
SKILL.md and the script limit their actions to local pattern processing and file-based logging under ~/.local/share/regexr. However, every user-supplied pattern/input is persisted to local log files (history.log and per-command logs), which can include sensitive data. The JSON export implementation is naive and likely to produce malformed output or expose raw contents without escaping.
Install Mechanism
No install spec; this is instruction-only with a bundled bash script. Nothing is downloaded from external URLs or written outside the user's home directory. Risk from install mechanism is low.
Credentials
Skill requests no environment variables or credentials. The data directory is in the user's home and is reasonable for a CLI tool. No unnecessary secrets requested.
Persistence & Privilege
Skill writes persistent logs to ~/.local/share/regexr and can export them; this is expected for the tool but users should be aware of persistent storage of inputs. always:false and default autonomous invocation are used (normal).
Assessment
This skill appears coherent and does what it says: a local CLI regex helper that logs your activity to ~/.local/share/regexr. Before installing, consider: (1) Any patterns or sample text you pass (which may contain secrets, tokens, or PII) are saved unencrypted in that directory — avoid submitting sensitive strings or configure the script to use a non-persistent/data-dir you control. (2) The JSON export in the script is implemented naively (no escaping, and the final newline/closing bracket handling looks incorrect) and may produce malformed exports or leak raw values; review/patch the export code before sharing exported files. (3) If you need stronger privacy, run the script in a sandbox or modify it to avoid logging or to encrypt logs. Otherwise the skill is internally consistent and does not request unrelated credentials or network access.

Like a lobster shell, security has layers — review code before you run it.

latestvk97crav12565504tfhrbeeta39837kmw
243downloads
0stars
1versions
Updated 1h ago
v2.0.0
MIT-0

Regexr

Developer tools CLI for checking, validating, generating, and working with regular expressions and code patterns. Lint syntax, explain complex expressions, convert between formats, generate templates, diff pattern versions, preview matches, fix common regex issues, and produce reports — all from the command line with persistent local logging.

Commands

Run regexr <command> [args] to use.

CommandDescription
checkCheck regex patterns for correctness and common pitfalls
validateValidate regex syntax and structure
generateGenerate regex patterns from descriptions or examples
formatFormat and prettify regex expressions
lintLint regex for style, performance, and safety issues
explainExplain what a regex pattern does in plain language
convertConvert regex between flavors (PCRE, JS, Python, etc.)
templateApply or manage regex templates for common use cases
diffDiff two regex patterns and show behavioral differences
previewPreview regex matches against sample text
fixAuto-fix common regex issues (escaping, anchoring, etc.)
reportGenerate regex quality and coverage reports
statsShow summary statistics across all categories
export <fmt>Export data in json, csv, or txt format
search <term>Search across all logged entries
recentShow recent activity from history log
statusHealth check — version, data dir, disk usage
helpShow help and available commands
versionShow version (v2.0.0)

Each domain command (check, validate, generate, etc.) works in two modes:

  • Without arguments: displays the most recent 20 entries from that category
  • With arguments: logs the input with a timestamp and saves to the category log file

Data Storage

All data is stored locally in ~/.local/share/regexr/:

  • Each command creates its own log file (e.g., check.log, validate.log, generate.log)
  • A unified history.log tracks all activity across commands
  • Entries are stored in timestamp|value pipe-delimited format
  • Export supports JSON, CSV, and plain text formats

Requirements

  • Bash 4+ with set -euo pipefail strict mode
  • Standard Unix utilities: date, wc, du, tail, grep, sed, cat
  • No external dependencies or API keys required

When to Use

  1. Building and testing regex patterns — use generate to create patterns from descriptions, check to verify correctness, and preview to test against sample data
  2. Learning and understanding regex — use explain to break down complex patterns into plain-language descriptions, perfect for code reviews or onboarding
  3. Linting and fixing regex in codebases — run lint to catch performance and safety issues (catastrophic backtracking, unanchored patterns), then fix to auto-correct them
  4. Converting regex across languages — use convert to translate patterns between JavaScript, Python, PCRE, and other flavors when porting code
  5. Documenting regex usage in projects — log patterns with template, generate report summaries, and export data for documentation or audits

Examples

# Check a regex pattern for issues
regexr check "^[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\.[a-zA-Z]{2,}$ — email validation"

# Validate regex syntax
regexr validate "(?<=@)[a-z]+\.com — lookbehind syntax OK"

# Generate a pattern from description
regexr generate "match IPv4 addresses: \d{1,3}(\.\d{1,3}){3}"

# Explain a complex regex
regexr explain "^(?=.*[A-Z])(?=.*\d).{8,}$ — password: 1 uppercase, 1 digit, 8+ chars"

# Lint for performance issues
regexr lint "(a+)+ — warning: catastrophic backtracking possible"

# Convert between flavors
regexr convert "JS→Python: /\d+/g becomes re.findall(r'\d+', text)"

# Fix common issues
regexr fix "added anchors: ^pattern$ and escaped special chars"

# Preview matches
regexr preview "pattern=[0-9]{3}-[0-9]{4} matched: 555-1234, 800-9999"

# View summary statistics
regexr stats

# Export all data as JSON
regexr export json

# Search logged patterns
regexr search "email"

Output

All commands output to stdout. Redirect to a file if needed:

regexr report "weekly pattern audit" > report.txt
regexr export csv  # saves to ~/.local/share/regexr/export.csv

Configuration

Set DATA_DIR by modifying the script, or use the default: ~/.local/share/regexr/


Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

Comments

Loading comments...