Vector
v2.0.3Reference tool for devtools — covers intro, quickstart, patterns and more. Quick lookup for Vector concepts, best practices, and implementation patterns.
⭐ 0· 230·2 current·2 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the provided assets: an instruction-only doc tool. The included script simply prints reference text; no extra credentials, binaries, or external services are requested.
Instruction Scope
SKILL.md instructs the agent to output plain-text heredocs and explicitly states no external API calls or network access. The runtime script only emits static documentation and does not read arbitrary files, environment variables, or network endpoints.
Install Mechanism
No install spec is present (instruction-only with an accompanying script). No downloads, package installs, or extraction steps are required; nothing is written to disk by an installer step.
Credentials
The skill declares no required environment variables, credentials, or config paths, and the code does not access any such values. Requested privileges are proportional to a static-reference tool.
Persistence & Privilege
always is false and the skill is user-invocable (normal). The skill does not request persistent presence or modify other skills or system-wide settings.
Assessment
This skill appears to be a harmless offline reference: it prints static documentation and requires no credentials or network access. Before installing or running any script, you may wish to: (1) verify the small version mismatch inside the script (manifest shows 2.0.3 while the script reports 2.0.2) to ensure you have the expected release; (2) inspect the script yourself (it is short and human-readable) or run it in a sandbox if you are concerned; and (3) monitor future updates—if later versions add network calls, env-var access, or installer steps, re-evaluate. Note: the agent can invoke the skill autonomously by default, which is normal here but worth knowing if you prefer manual control.Like a lobster shell, security has layers — review code before you run it.
latestvk978t26m8ys6eza4259zf634vd83gb0g
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
