Graphql Client
v2.0.2Reference tool for devtools — covers intro, quickstart, patterns and more. Quick lookup for Graphql Client concepts, best practices, and implementation patte...
⭐ 0· 109·0 current·0 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Graphql Client reference) align with the provided SKILL.md and the included script: both provide local, static reference text and CLI-like commands. There are no unexpected credentials, binaries, or cloud access requested.
Instruction Scope
SKILL.md instructs only local, plain-text reference output and explicitly states no external API calls or credentials. The runtime script simply prints heredoc documentation for each command and does not read files, environment variables, or reach out over the network.
Install Mechanism
No install spec is provided and the skill is instruction-only with an optional script. Nothing is downloaded or extracted; no external install URLs or package installs are present.
Credentials
The skill requires no environment variables, credentials, or config paths. The script does not reference or read environment secrets; requested access is proportional (none).
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges, nor does it modify other skills or system configuration.
Assessment
This skill appears to be a local reference tool only — it prints static documentation and does not access network resources or secrets. Minor issues: the script's internal VERSION is 2.0.1 while registry metadata is 2.0.2 (harmless version mismatch), and the help heredoc uses quotes so $VERSION won’t expand (a benign bug). If you trust the BytesAgain source and repository, this is safe to install; if you want extra assurance, review the repository commit history and confirm the homepage/source URLs before installing or running scripts from unknown authors.Like a lobster shell, security has layers — review code before you run it.
latestvk97br55nk25jd4em0wwz1kfqw183gxwc
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
