Maintenance

v2.0.1

Log home maintenance tasks, set reminders, and track repair history with checklists. Use when scheduling repairs, tracking appliance upkeep, inventorying.

0· 196·3 current·3 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the delivered functionality: a local CLI that logs maintenance items, shows stats, searches, and exports. It does not ask for unrelated credentials or system access.
Instruction Scope
SKILL.md and the script limit operations to the data directory (~/.local/share/maintenance). Instructions do not direct the agent to read unrelated system files, send data externally, or perform privileged actions.
Install Mechanism
There is no network install spec; the repository provides a shell script. Nothing is downloaded from external URLs or installed system‑wide by the skill itself.
Credentials
No environment variables or credentials are required. The script uses the standard HOME variable and standard CLI tools (grep, tail, du, wc), which is appropriate for a local CLI tool.
Persistence & Privilege
The skill is not always-enabled and is user-invocable. It writes only to its own data directory and history.log and does not modify other skills or global agent configuration.
Assessment
This skill appears to do exactly what it says: it creates and writes logs and exports under ~/.local/share/maintenance and runs only standard shell utilities. Before installing, review the script if you want to be certain (it is included in the package). Note that data is stored unencrypted in your home directory, exports are plain files, and JSON export does minimal escaping so special characters may produce malformed JSON — if that matters, back up the directory or inspect exported files. If you do not trust the repository author, avoid running the script; otherwise the footprint is local and proportional to the stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk975yx9tdj9xjrgagkfajvakkd8348gj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments