Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
tokenmeter
v0.1.1Track AI token usage and costs across providers. Import sessions, view dashboard, costs breakdown, and compare Max plan savings.
⭐ 0· 1.4k·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (track tokens and costs locally) align with the code: a CLI that reads session JSONL files, writes a local SQLite DB, computes costs, and can optionally call provider APIs. Minor inconsistency: SKILL.md clones https://github.com/jugaad-lab/tokenmeter.git while pyproject.toml points to https://github.com/yajatns/tokenmeter — this mismatch of source/homepage is unexplained and worth verifying.
Instruction Scope
SKILL.md instructs the agent to clone the repo, create/activate a venv, pip install the package, read session JSONL files (e.g., ~/.clawdbot/agents/*/sessions/*.jsonl, ~/.claude/projects/*/sessions/), and run tokenmeter commands. Those steps are within the stated goal (import local sessions and compute costs). The skill will also scan env vars for provider API keys and may call provider usage endpoints — this is within scope for the fetch feature but means it will access environment secrets if present.
Install Mechanism
There is no registry install spec; SKILL.md instructs cloning a GitHub repo and running pip install -e inside a newly created venv. That causes remote code to be downloaded and executed locally. While GitHub is a common source, the clone URL in SKILL.md (jugaad-lab) doesn't match the repository URLs in pyproject (yajatns). Automatic cloning + pip install from an external repository increases risk and should be reviewed manually before running.
Credentials
The code optionally scans environment variables for API keys (ANTHROPIC_API_KEY, OPENAI_API_KEY/OPENAI_KEY, GOOGLE_API_KEY/GEMINI_API_KEY, AZURE_OPENAI_API_KEY) which is proportional to the fetch capability (pulling usage from provider APIs). The skill does not declare required env vars because these are optional. No unrelated credentials or extra secrets are requested in the manifest. Make sure you understand which keys are present in the agent's runtime environment before permitting fetch operations.
Persistence & Privilege
The skill writes to ~/.tokenmeter/usage.db, creates a venv under ~/clawd/tokenmeter, and stores import checkpoint metadata under ~/.tokenmeter/import-state.json — these are expected for persistent local tracking. always:false (not force-installed) and normal autonomous invocation are in effect. The combination of autonomous invocation plus the ability to auto-clone/install remote code and scan env vars raises the blast radius if you permit the agent to run the install automatically.
What to consider before installing
What to consider before installing/running this skill:
- Review the repository before auto-install: SKILL.md instructs the bot to git clone a remote repo and pip install it into a venv. That will execute code downloaded from the network. Verify the repo URL and contents (note the SKILL.md clone URL differs from pyproject.toml metadata).
- Prefer manual installation: instead of letting the agent run the clone/install automatically, run the steps yourself in a controlled environment (or an isolated VM/container) so you can inspect code and dependencies first.
- Expect local files to be read/written: tokenmeter reads session JSONL files (e.g., ~/.clawdbot/agents/*/sessions/*.jsonl and ~/.claude/projects/*/sessions/), writes DB at ~/.tokenmeter/usage.db, and creates a venv at ~/clawd/tokenmeter/. This is normal for the stated purpose but be comfortable with those paths being accessed.
- Environment keys will be probed if you run fetch: the tool scans for common provider API keys and may call provider APIs. If your runtime has provider API keys in environment variables, the skill may use them to query usage. If you don't want that, remove keys from the environment or avoid the fetch command.
- Watch for proxy/webhook features: README mentions proxy and webhook integration — these could forward data externally if configured. If you plan to use proxy features, verify where data is sent and ensure you trust the endpoint.
- If uncertain, inspect the following files first: fetcher.py (env scanning and HTTP calls), importer.py (parsing local session files), and any files that implement proxy/webhook behavior. Check for hard-coded external endpoints or telemetry logic.
If you review the code and trust the source, the skill is coherent for its purpose. If you cannot verify the repo, treat the automatic install/execute behavior as a risk and avoid auto-running the install steps.Like a lobster shell, security has layers — review code before you run it.
electron-essentialvk97amwkrxrpjkyfnsv4rp5hve980vw5tlatestvk97amwkrxrpjkyfnsv4rp5hve980vw5t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📊 Clawdis
