Cronjob
v2.0.1Manage cron jobs with execution logging and failure alert tracking. Use when adding tasks, monitoring execution, debugging failed crons.
⭐ 0· 279·1 current·1 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the provided artifacts: SKILL.md and the included script implement a local cronjob logging/monitoring utility. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
Runtime instructions and the script operate entirely on a local data dir (~/.local/share/cronjob by default). They only read/write files inside that directory and use standard unix utilities. Note: logs are stored in plain text and any sensitive strings you record will be persisted; SKILL.md warns there is no cloud sync.
Install Mechanism
No install spec; the skill is instruction-only with an included Bash script. Nothing is downloaded or installed from remote URLs during install.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. The script respects CRONJOB_DIR override and otherwise uses only HOME to build a per-user data directory — appropriate for this purpose.
Persistence & Privilege
always is false and the skill does not request elevated or cross-skill configuration. It persists only to its own data directory and does not attempt to modify system-wide settings or other skills.
Assessment
This skill appears internally consistent and implements a purely local cron logging tool. Before installing: (1) review and run the included scripts locally (they will create ~/.local/share/cronjob by default); (2) avoid writing secrets into log entries because logs are plain-text and retained locally; (3) if you prefer a different location set CRONJOB_DIR; and (4) only grant execution if you trust the BytesAgain source or after inspecting the script contents yourself. If you need networked alerting, verify or extend the tool explicitly — it currently does not perform any network I/O.Like a lobster shell, security has layers — review code before you run it.
latestvk977zd422ndh27bqwfp4n499a5834p41
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
