Browserslist Validator

v1.0.0

Validate .browserslistrc files and browserslist config in package.json for syntax errors, deprecated browsers, redundant queries, and best practices. Use whe...

0· 109·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for charlie-morrison/browserslist-validator.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Browserslist Validator" (charlie-morrison/browserslist-validator) from ClawHub.
Skill page: https://clawhub.ai/charlie-morrison/browserslist-validator
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install browserslist-validator

ClawHub CLI

Package manager switcher

npx clawhub@latest install browserslist-validator
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (browserslist validation) matches the delivered assets: SKILL.md documents commands that run the included Python validator and there are no unrelated environment variables, binaries, or install steps requested.
Instruction Scope
SKILL.md instructs the agent to run the included script against .browserslistrc or package.json. The script reads provided files and produces validation output; the instructions do not ask the agent to read other unrelated files, contact external endpoints, or exfiltrate data.
Install Mechanism
There is no install spec (instruction-only skill + bundled script). No network downloads, package installs, or archive extraction are required.
Credentials
The skill requires no environment variables, credentials, or config paths. The bundled script operates on local files supplied by the user (as expected for a linters/validator).
Persistence & Privilege
always is false and the skill does not request elevated or persistent presence. It does not modify other skills or system-wide settings in the provided materials.
Assessment
This skill appears to do exactly what it claims: a Python-based validator for browserslist configs. Before running: ensure you trust the source of the skill (it contains an executable script), have Python 3 available, and run the validator only on files you intend to analyze (it reads files you point it at). If you want extra assurance, open and review scripts/browserslist_validator.py locally (it contains no network calls or hidden endpoints in the provided content).

Like a lobster shell, security has layers — review code before you run it.

latestvk97fwn9y37s1dztnrffmn5mc9x859vxf
109downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

Browserslist Validator

Validate .browserslistrc files and browserslist entries in package.json for syntax errors, deprecated browsers, redundant queries, and best practices.

Commands

# Full validation (all rules)
python3 scripts/browserslist_validator.py validate .browserslistrc

# Validate browserslist in package.json
python3 scripts/browserslist_validator.py validate package.json

# Quick syntax-only check
python3 scripts/browserslist_validator.py check .browserslistrc

# Estimate coverage
python3 scripts/browserslist_validator.py coverage .browserslistrc

# Explain each query in human-readable form
python3 scripts/browserslist_validator.py explain .browserslistrc

# JSON output
python3 scripts/browserslist_validator.py validate .browserslistrc --format json

# One-line PASS/WARN/FAIL summary
python3 scripts/browserslist_validator.py validate .browserslistrc --format summary

# Strict mode (warnings become errors)
python3 scripts/browserslist_validator.py validate .browserslistrc --strict

# Target environment
python3 scripts/browserslist_validator.py validate .browserslistrc --env production

Rules (20)

#CategorySeverityRule
S1SyntaxEFile not found or unreadable
S2SyntaxEEmpty config (no queries)
S3SyntaxEInvalid query syntax / unknown browser name
S4SyntaxWDuplicate queries
B1BrowsersWDead/deprecated browser (IE, Blackberry, etc.)
B2BrowsersWBrowser with <0.01% global usage
B3BrowsersEBrowser version does not exist (e.g. Chrome 999)
B4BrowsersEUnknown browser name
Q1QueriesWRedundant query (covered by broader query)
Q2QueriesWConflicting queries (e.g. > 1% and < 0.5%)
Q3QueriesEnot dead without any positive query
Q4QueriesWEmpty result after not negation
C1CoverageWVery low total coverage (<80%)
C2CoverageWVery high coverage (>99.5%, may include dead browsers)
C3CoverageINo mobile browser coverage hint
C4CoverageINo country-specific override detected
P1Best PracticesWIE queries present (recommend dropping IE)
P2Best PracticesWUnreasonably old versions (last 20 versions)
P3Best PracticesWall query used (too broad)
P4Best PracticesWVersion pinning instead of range (Chrome 90)

Output Formats

  • text (default): Human-readable with [E]/[W]/[I] severity prefix
  • json: Machine-readable structured output
  • summary: Single-line PASS / WARN / FAIL

Exit Codes

  • 0 — No errors
  • 1 — Errors found (or warnings in --strict mode)
  • 2 — File not found or parse error

Comments

Loading comments...