Requirements Checker

v1.0.0

Validate, lint, and sort Python requirements.txt files for best practices and CI.

0· 45·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the provided script and SKILL.md. The tool only needs to read/compare/sort requirements files and the included Python script implements those features; no unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md instructs the agent to run the included Python script on local requirements files (validate, lint, duplicates, sort, compare). The instructions reference only local file paths and output formats; they do not ask the agent to read unrelated system files, environment variables, or send data to external endpoints.
Install Mechanism
No install spec is provided (instruction-only wrapper with an included script). The script claims to be pure stdlib Python and does not declare downloads or external package installation.
Credentials
The skill declares no required environment variables, credentials, or config paths. The code reviewed does not read environment variables or request secrets.
Persistence & Privilege
The skill does not request always: true and has default invocation settings. It does not modify other skills or agent-wide configuration. The only potentially persistent effect is writing files when the user passes the --write flag to the sort command (expected behavior).
Assessment
This skill appears to do what it says: lint/validate/sort requirements files using the included Python script. Before installing or running it in CI, review and run the script locally on non-critical files: 1) run read-only commands first (validate/lint/compare/sort without --write) to inspect output; 2) if using --write, ensure you have backups or run under version control; 3) inspect the included script yourself (it's provided) to confirm it matches your security posture. No network calls, credentials, or installers were found in the provided files.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ddb4zkrmxq9e27w7dany7kh84s2ne

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments