Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill name/description (Computerized maintenance management system) matches the provided script and commands: add/list/search/remove/export/stats/config operate on local JSONL data. There are no unrelated capabilities requested.
Instruction Scope
SKILL.md directs the agent to run scripts/script.sh for each command. The script only reads/writes files under DATA_DIR (default ~/.cmms), uses an optional CMMS_DIR env var, and prints structured output; it does not access network endpoints or other system configuration.
Install Mechanism
No install spec or external downloads are present (instruction-only with an included script), which is low risk. Note: the script will be executed as provided; its contents are plain shell and there are no hidden installers or external fetches.
Credentials
No required environment variables or credentials are declared; only an optional CMMS_DIR to override the data directory. That is proportionate for a local data-store tool.
Persistence & Privilege
always is false and the skill does not request to persist or modify other skills or system-wide settings. It only creates/updates files under the user's DATA_DIR.
Assessment
This skill is coherent and low-risk: it runs a bundled shell script that creates and modifies files in ~/.cmms (or $CMMS_DIR if set) and does not reach out over the network or ask for credentials. Before installing, be aware it will: (1) create and write data and a config file in your home directory (~/.cmms), (2) use standard shell tools (grep, sed, tail, wc, du, cp); those binaries are expected but not listed in the metadata, and (3) execute the provided scripts/script.sh when invoked by the agent. If you use a shared or sensitive account, review the script content and set CMMS_DIR to a safe location; avoid running as root. If you need networked/backed-up storage or stricter access controls, this local-only tool may be insufficient.Like a lobster shell, security has layers — review code before you run it.
latestvk9768m6c9q062q766mec271gw5839pwh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
