Vrf

v1.0.0

Analyze vrf operations. Use when you need to understand vrf mechanisms, evaluate protocol security, or reference on-chain concepts.

0· 91·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (VRF analysis) match the included CLI: the skill provides commands to add/list/search/export entries and basic stats/config management. No unrelated capabilities are requested.
Instruction Scope
SKILL.md instructs the agent to run the included scripts/script.sh with specific commands. The script only reads/writes files under the data directory and prints local info; it does not read other system files, environment variables (except optional VRF_DIR), or send data externally.
Install Mechanism
No install spec; the skill is instruction-only with an included script. Nothing is downloaded or extracted from remote URLs.
Credentials
No required environment variables or credentials. The script uses an optional VRF_DIR override to change the data directory; this is proportionate to the stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent platform privileges or modify other skills' configuration. It persists only its own data/config under the user data directory.
Assessment
This skill appears safe and self-contained: it runs a local shell script that stores entries in ~/.vrf by default and does not transmit data or ask for secrets. Before installing, consider: (1) data is stored plaintext in ~/.vrf/data.jsonl and config.txt — do not store sensitive secrets there; (2) you can override the directory with VRF_DIR if you want data elsewhere; (3) the script uses common UNIX tools (grep/sed/tail) and sed -i behavior can differ on macOS (BSD sed) — not a security issue but may affect editing; (4) if you require extra assurance, review the script file locally (scripts/script.sh) to confirm behavior. Overall the skill is coherent with its description.

Like a lobster shell, security has layers — review code before you run it.

latestvk971msfa3m8ywxkgeg6w0fn9f183ay7p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments