Tsconfig Validator
v1.0.0Validate and lint tsconfig.json files for common mistakes, conflicting compiler options, strictness gaps, and best practices. Use when asked to lint, validat...
⭐ 0· 44·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included artifact: a Python script that parses and lints tsconfig.json files. The declared requirements are minimal and consistent with a local linter (no credentials, no external services).
Instruction Scope
SKILL.md instructs the agent to run the bundled Python script (e.g., `python3 scripts/tsconfig_validator.py lint tsconfig.json`). This stays within the stated purpose (reading and analyzing tsconfig.json). Note: SKILL.md does not explicitly declare that python3 is required as a binary dependency; the script assumes a local Python runtime and will read files from disk, which is expected for a linter.
Install Mechanism
No install spec — instruction-only with a bundled Python script. The script claims to use only the Python stdlib and there are no downloads or external package installs in the manifest.
Credentials
No environment variables, credentials, or config paths are requested. The operations observed (parsing JSON, checking keys/values, reading the tsconfig file) are proportional to the tool's purpose.
Persistence & Privilege
The skill is not marked always:true, does not request persistent system-wide changes, and does not attempt to modify other skills or agent configuration in the provided files.
Assessment
This skill appears to be a straightforward tsconfig linter implemented as a Python script. Before installing or running it: (1) verify you have python3 available on the agent host (SKILL.md calls python3 but does not list it as a required binary); (2) review the bundled script if you have concerns — it appears to only read and analyze tsconfig.json files and uses the stdlib, with no network calls or secret access in the reviewed sections; (3) run it first on non-sensitive/example configs to confirm behavior. If you want higher assurance, request the full (untruncated) script for inspection to ensure there are no network calls or file writes in the remainder of the file.Like a lobster shell, security has layers — review code before you run it.
latestvk979ebnsbntbv32cse2bvgmm1584smsh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
