Subpoena

v1.0.0

Subpoena law reference — types of subpoenas, service requirements, compliance obligations, and motion to quash. Use when issuing, receiving, or responding to...

0· 89·0 current·0 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description (subpoena reference) aligns with the provided assets: SKILL.md documents subpoena topics and the included scripts/script.sh prints legal guidance. There are no unrelated credentials, binaries, or install steps requested.
Instruction Scope
Runtime instructions only call the included scripts/script.sh commands (intro, types, procedure, compliance, quash, etc.). SKILL.md does not instruct reading unrelated system files, network endpoints, or exfiltrating data. The only configuration noted is SUBPOENA_DIR for local data storage.
Install Mechanism
There is no install spec and no downloads; the skill is instruction-only plus a bundled shell script, which means nothing external is fetched during install.
Credentials
The skill declares no required environment variables or credentials; SKILL.md documents an optional SUBPOENA_DIR (default ~/.subpoena/) which is proportionate for a local reference tool. No secret-exposing env vars are requested.
Persistence & Privilege
always is false and the skill is user-invocable. There is no indication it modifies other skills or global agent settings. Running the script will execute local shell code but does not request permanent elevated privileges.
Assessment
This skill appears coherent and limited: it runs a bundled bash script that prints subpoena guidance, asks for no credentials, and has no install/download steps. However: (1) the displayed script output was truncated in the listing — review the entire scripts/script.sh file before installing to confirm there are no hidden network calls, file reads/writes outside the declared SUBPOENA_DIR, or commands that could modify system state; (2) any skill that executes shell code should be installed only from a trusted source or run in a sandbox; and (3) if you are concerned about file writes, check whether the script creates or writes under ~/.subpoena/ (or another path) and whether that behavior is acceptable.

Like a lobster shell, security has layers — review code before you run it.

latestvk975jtqnn2g4mp3z7pcq4gdz6583a1xq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments