Beat
v2.0.0Track, analyze, and manage music and audio files from the command line. Use when organizing playlists, converting formats, or analyzing metadata.
⭐ 0· 109·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (music/audio CLI) match the code and instructions. The provided script implements commands for run/check/convert/analyze/export/etc., all of which reasonably belong to a local music/metadata management tool.
Instruction Scope
SKILL.md instructs only local CLI usage. The shipped script logs every command and input to ~/ .local/share/beat/*.log and history.log — this is consistent with the stated automatic history feature but means any text you pass (including secrets) will be recorded locally.
Install Mechanism
Instruction-only skill with a single shell script file; no install spec, no downloaded code or external package installs. Low installation risk.
Credentials
No environment variables, credentials, or config paths are requested. The script only uses the user's HOME to create ~/.local/share/beat, which is proportional to its function.
Persistence & Privilege
The skill is not forced-always and does not request elevated privileges, but it does create and persist logs and export files under ~/.local/share/beat. This is expected for a tracker but worth noting if you need to limit on-disk traces.
Assessment
This skill appears to do what it says: an offline CLI for tracking and exporting music/audio-related entries. It stores logs and exports under ~/.local/share/beat — any text you enter (including potentially sensitive notes) will be recorded there. There are no network calls or credential requests in the code, so it will not exfiltrate data by itself. If you plan to input sensitive strings, either avoid doing so or periodically inspect/delete the logs. If you want extra assurance, review the script locally before enabling or run it in a sandboxed account.Like a lobster shell, security has layers — review code before you run it.
latestvk97bpaggdtsa5rctkbmp9h6bw9835x0z
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
