Staking

v1.0.0

Analyze staking operations. Use when you need to understand staking mechanisms, evaluate protocol security, or reference on-chain concepts.

0· 91·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included script and commands: the skill provides local commands (status, add, list, search, remove, export, stats, config) for analyzing/recording staking operations. Nothing requested or included is outside that scope.
Instruction Scope
SKILL.md invokes scripts/script.sh for all commands. The script only reads and writes files under a configurable data directory (default ~/.staking), and uses standard shell utilities. It does not call external network endpoints, probe unrelated system config, or attempt to read other environment variables or credentials.
Install Mechanism
There is no install spec; the skill is instruction-only plus an included shell script. No remote downloads or archive extraction occur as part of the skill bundle.
Credentials
No required environment variables or credentials are declared. The only environment influence is an optional STAKING_DIR to change the data directory, which is appropriate for a local data-keeping tool.
Persistence & Privilege
always:false and user-invocable. The skill stores data in its own directory (~/.staking by default) and does not modify other skills or system-wide agent settings.
Assessment
This skill runs a local shell script that stores data under ~/.staking by default (configurable via STAKING_DIR). There are no network calls or credential requests. Before installing, consider whether you are comfortable storing staking notes in plaintext on your machine; avoid adding private keys or sensitive secrets to entries since the data is stored locally and unencrypted. Additionally, if you set STAKING_DIR to point at another location, the script will read and write there, so do not point it to sensitive system locations.

Like a lobster shell, security has layers — review code before you run it.

latestvk976yd9rhmcmhdjt7geyt5wr5d83assj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments