Doc Summarize Pro

v3.0.0

Enhanced document summarizer. Smart summary, bullet extraction, executive summary, chapter breakdown, multi-doc comparison, translate+summarize.

0· 597·2 current·3 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included scripts and commands. All required operations (summarize, keywords, outline, compare, batch, export, etc.) are implemented locally in the provided bash/Python scripts and rely on local files — nothing extraneous is requested.
Instruction Scope
Instructions direct the agent to run included scripts on local files and directories, which is expected. The skill stores config and history under $HOME/.doc-summarize-pro; history.log records commands and file paths/timestamps (privacy consideration). There are no instructions to read unrelated system files or transmit data externally.
Install Mechanism
No install spec — the skill is instruction-only with bundled scripts that run from the skill package. Nothing is downloaded or written outside the $HOME/.doc-summarize-pro directory created by the scripts.
Credentials
No environment variables, credentials, or external tokens are requested. The scripts use $HOME for config/history (reasonable for a local CLI tool) and no other sensitive env vars are accessed.
Persistence & Privilege
always is false and the skill only writes its own config and history under $HOME/.doc-summarize-pro. It does not modify other skills or system-wide agent settings.
Assessment
This skill appears to be a local-only summarizer: it does not require credentials or network access. Before installing, note that it will create a directory $HOME/.doc-summarize-pro containing a config file and history.log (which records commands and file names/timestamps). If you process sensitive documents and want no traces, avoid running it on those files or manually clear the history/config afterwards. Otherwise the tool is self-contained and coherent with its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

chinesevk97e58b77mdagqfzt6t7pbxk4x82qcd2latestvk97ezw8rhgc9qrc54b8460d4a5836cvaproductivityvk976ppf83spx44gnrery3z9fn182sfar

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments