Networkmanager

v2.0.2

Reference tool for devtools — covers intro, quickstart, patterns and more. Quick lookup for Networkmanager concepts, best practices, and implementation patte...

0· 102·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description describe a local reference tool and there are no requests for credentials, network access, or unrelated binaries. The included script only prints static documentation, which matches the stated purpose. Minor inconsequential mismatch: script VERSION is "2.0.1" while registry metadata is 2.0.2.
Instruction Scope
SKILL.md says outputs are plain-text heredocs with no external API calls; the bash script implements exactly that and does not read files, environment variables, network endpoints, or system configs beyond using the shell. No scope creep observed.
Install Mechanism
There is no install spec (instruction-only skill). A single executable script is included in the bundle; nothing is downloaded or extracted at install time and no external installers are invoked.
Credentials
No required environment variables, credentials, or config paths are declared or used. The script does not read environment variables or sensitive files. It does rely on a POSIX shell being available (bash shebang), which is expected.
Persistence & Privilege
Flags indicate normal behavior (always:false, model invocation allowed). The skill does not request persistent presence, does not modify other skills or system-wide configuration, and does not store credentials.
Assessment
This skill appears to be a simple offline reference: it outputs static documentation and does not request credentials or make network calls. Before installing, you can (1) inspect the included scripts (already done here) to confirm they are benign, (2) note the small version mismatch in the script (VERSION variable) which is likely a harmless oversight, and (3) only grant it normal agent invocation — there are no extra privileges required. As with any executable from third-party authors, install only if you trust the bytesagain/BytesAgain source.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d572tj8n6azjwfhjy0sgc3s83h12p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments