Symptom
v2.0.1Log health symptoms, track patterns, and chart trends. Use when logging symptoms, tracking frequency, charting trends, reviewing patterns.
⭐ 0· 168·0 current·0 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (symptom logging, tracking, charting) match the included script and SKILL.md. No unrelated binaries, services, or credentials are requested.
Instruction Scope
SKILL.md instructs use of a local command-line tool; the runtime script implements only local file operations (create directory, append logs, search, export). The instructions do not ask the agent to read unrelated system configuration or transmit data externally.
Install Mechanism
There is no install spec (instruction-only), but a script file (scripts/script.sh) is included in the bundle. The repository does not automatically install binaries or fetch remote code — the script will run locally if placed on PATH or invoked directly.
Credentials
The skill declares no required environment variables, credentials, or config paths. The script uses the user's HOME to create ~/.local/share/symptom, which is proportional for local data storage.
Persistence & Privilege
Skill is not always-enabled and does not request elevated system privileges. It writes only to a per-user data directory under the home directory and does not modify other skills or system-wide configuration.
Assessment
This skill appears to be a simple offline CLI tool and is internally consistent. Before installing/running: (1) review scripts/script.sh yourself (it's a plain bash script) to confirm you are comfortable with its behavior; (2) run it as a normal user (not root) to limit impact; (3) note it stores sensitive health notes at ~/.local/share/symptom — consider file permissions or encrypting backups if you want stronger privacy; (4) the package includes no network calls or credential requests, but only run software from sources you trust and keep backups of your data.Like a lobster shell, security has layers — review code before you run it.
latestvk970q8fb230heskxg8zfbry6cd83539q
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
