Resilient PDF

v1.1.0

Recover PDF extraction and summarization workflows when native PDF handling fails, hangs, times out, or rejects large files. Use when working with local or r...

0· 85·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the provided SKILL.md and the included script. The script implements URL download, local extraction via a detected 'uvx' binary, chunking, and a lightweight summary — all coherent with a 'resilient PDF' fallback workflow. There are no unrelated credentials, binaries, or config paths requested.
Instruction Scope
Runtime instructions are narrowly scoped: download a remote PDF or read a local path, run scripts/extract_pdf.py to produce markdown/chunks/summary, and inspect outputs. The instructions and script only access the provided PDF, workspace paths, and the user's home path to look for ~/.local/bin/uvx. They do not attempt to read unrelated config, secrets, or other system data.
Install Mechanism
There is no install spec; the skill is instruction-only with one helper script. The only install hint is a pip command to obtain 'uv' (uvx) if missing. No downloads from untrusted URLs or archive extraction are present in the install step.
Credentials
No environment variables, credentials, or config paths are required. The script does check for uvx in PATH and ~/.local/bin, and writes outputs to workspace locations requested by the operator — these are proportional to the stated task.
Persistence & Privilege
The skill does not request permanent presence (always:false) and does not modify other skills or system-wide settings. It writes files only to operator-specified output or chunk directories and may create parent directories as needed, which is appropriate for a local extraction workflow.
Assessment
This skill appears to do exactly what it claims: download PDFs you point it at, run a local extractor (uvx/markitdown), produce markdown/chunks and a small first-pass summary. Before using it: (1) only pass URLs you trust (it will download arbitrary remote content), (2) review or sandbox the uvx binary you will invoke — uvx will be executed as a subprocess and its provenance matters, (3) prefer running installs (pip ...) as a non-root user and inspect packages before installation, and (4) remember PDFs themselves can contain malicious content, so run this on untrusted PDFs in an isolated environment if you have concerns.

Like a lobster shell, security has layers — review code before you run it.

latestvk97brrdk9whawcmvjgg52qv60d84j2m2

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments