Logscope

v2.0.3

Reference tool for devtools — covers intro, quickstart, patterns and more. Quick lookup for Logscope concepts, best practices, and implementation patterns.

0· 123·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (Logscope reference) match the delivered artifacts: SKILL.md documents reference commands and the included script prints static reference text. There are no unrelated env vars, binaries, or capabilities requested.
Instruction Scope
SKILL.md instructs the agent to output plain-text heredocs with no external API calls or credentials. The runtime script implements those commands and does not read arbitrary files, environment secrets, or perform network calls. Minor inconsistency: SKILL metadata/version is 2.0.3 while the script sets VERSION="2.0.2" (harmless but worth noting).
Install Mechanism
No install spec is provided (instruction-only). The only code is a small local shell script; nothing is downloaded or written to disk during an install step.
Credentials
No required environment variables, credentials, or config paths are declared or accessed by the script or SKILL.md. The documentation mentions tools like tcpdump/wireshark in examples but does not request their credentials or invoke them.
Persistence & Privilege
always:false and default invocation settings are used. The skill does not request persistent system presence or attempt to modify other skills or global agent configuration.
Assessment
This skill appears to be a simple local reference: installing it only adds a small script that prints documentation and it does not request credentials or perform network calls. Before enabling, you can (1) inspect scripts/script.sh yourself to verify behavior (it’s short and readable), (2) note the small version string mismatch (2.0.3 vs 2.0.2) which is likely a packaging oversight, and (3) remember that while the skill itself makes no network requests, the agent platform could still be permitted to access network resources—only enable if you trust the agent runtime and its network policies.

Like a lobster shell, security has layers — review code before you run it.

latestvk9743ymgzsh8v58h9xwern1ttx83hsp1

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments