Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Decode

Decode - command-line tool for everyday use

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 41 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The README/description advertises a 'decoder toolkit' (base64, URL, JWT decode, parsing). The included script implements generic logging/search/export and many commands (check, validate, generate, format, etc.) but does not implement explicit decode/parse routines shown in the description. Command names and examples in SKILL.md also don't fully align with the script. This mismatch could be benign (poor documentation) but is an incoherence the user should be aware of.
Instruction Scope
Runtime instructions and the script operate entirely on files under $HOME/.local/share/decode — creating logs, appending entries, searching and exporting all *.log files. There are no network calls or credential requirements in the visible portion. However the export reads all log files and writes an export file (json/csv/txt), so anything you enter into the tool will be persisted and can be exported unfiltered. Also the script content provided in the listing was truncated, so we could not inspect the full behavior.
Install Mechanism
No install spec; the skill is instruction-only with an included script. Nothing is downloaded from the network or installed automatically in the inspected files.
Credentials
The skill declares no required environment variables or credentials. The script uses HOME and allows an optional DECODE_DIR (documented). That access is proportionate to a local CLI that stores files under the user's home.
Persistence & Privilege
The skill does not request persistent platform privileges (always:false) and only writes to a per-user data directory. It does not modify other skills or global agent settings in the visible code.
What to consider before installing
What to consider before installing: - Documentation mismatch: The SKILL.md promises 'base64/URL/JWT decode' features that are not present in the visible script — this may indicate incomplete/poor packaging or missing code. Ask the publisher for the full source or verify the missing functionality before trusting it. - Truncated file: The provided scripts/script.sh content appears truncated in the package listing. Because we could not review the entire script, there is residual uncertainty about behavior in the missing portion (it could contain additional logic or network calls). Do not run the script until you have the full file and have reviewed it. - Local data and exports: The tool stores everything you pass into it under ~/.local/share/decode and exports all *.log files when you run export. Do not paste secrets, tokens, passwords, or sensitive payloads into this tool — they will be persisted and easily exported. - No network/credentials required in the visible code, which is good — but confirm the missing portion does not initiate network access. - If you want to proceed: inspect the full scripts/script.sh file locally (or request it from the author), run it in a sandboxed environment or throwaway account first, and check the created files under ~/.local/share/decode to ensure they match expected behavior. If you rely on it for decoding sensitive material, prefer a well-documented tool whose code you can fully audit.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.2
Download zip
latestvk97bbq90q003prws7nvmafdzsd831jaa

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Decode

Decoder toolkit — base64 decode, URL decode, JWT decode, and format parsing.

Commands

CommandDescription
decode helpShow usage info
decode runRun main task
decode statusCheck state
decode listList items
decode add <item>Add item
decode export <fmt>Export data

Usage

decode help
decode run
decode status

Examples

decode help
decode run
decode export json

Output

Results go to stdout. Save with decode run > output.txt.

Configuration

Set DECODE_DIR to change data directory. Default: ~/.local/share/decode/


Powered by BytesAgain | bytesagain.com Feedback & Feature Requests: https://bytesagain.com/feedback

Features

  • Simple command-line interface for quick access
  • Local data storage with JSON/CSV export
  • History tracking and activity logs
  • Search across all entries
  • Status monitoring and health checks
  • No external dependencies required

Quick Start

# Check status
decode status

# View help and available commands
decode help

# View statistics
decode stats

# Export your data
decode export json

How It Works

Decode stores all data locally in ~/.local/share/decode/. Each command logs activity with timestamps for full traceability. Use stats to see a summary, or export to back up your data in JSON, CSV, or plain text format.

Support

Powered by BytesAgain | bytesagain.com

Files

2 total
Select a file
Select a file to preview.

Comments

Loading comments…