Age

v1.0.0

age file encryption reference — the modern, simple alternative to GPG. Covers key generation, X25519 encryption, SSH key support, passphrase mode, pipe patte...

0· 84·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (age encryption reference) match the provided SKILL.md and the included script which is a text/manual-style helper. Examples reference age, keygen, SSH, sops, YubiKey and related tools — all coherent with the stated purpose.
Instruction Scope
The instructions include example commands that reference system paths (~/.ssh, ~/.config/age), network endpoints (curl https://github.com/username.keys), and third-party CLIs (aws s3 cp, sops). These are example usage patterns appropriate for an encryption reference, but users/agents must not run them automatically since they touch local keys, cloud storage, or external endpoints.
Install Mechanism
No install spec is present and the skill is instruction-only (plus a script that prints documentation). Nothing is downloaded or written to disk by an installer, so install risk is low.
Credentials
The skill declares no required environment variables or credentials. Example commands show use of existing tools/credentials (AWS CLI, ssh keys) but the skill does not request any secrets itself — this is proportionate for an encryption reference.
Persistence & Privilege
always is false and the skill does not request persistent or elevated platform privileges. It does not modify other skills or system-wide agent settings.
Assessment
This skill is a documentation/reference for the age encryption tool and appears internally consistent. Before using it: (1) review and understand any example commands that reference local private keys (~/.ssh, identity files) or cloud endpoints (aws s3, curl to GitHub) — do not run them blindly, since they can read or upload sensitive data; (2) verify you have the genuine age/rage binaries and any plugins installed from official sources before following install instructions; (3) treat the included scripts as plaintext documentation (they print examples) and avoid executing them on systems where you don't want commands like tar, mysqldump, aws s3 cp, or curl to run; (4) if you plan to let an agent invoke this skill autonomously, lock down what the agent is allowed to access (SSH keys, AWS credentials, local files) because many examples assume access to those resources even though the skill itself doesn't request them.

Like a lobster shell, security has layers — review code before you run it.

latestvk97521rv42kz5tp0pm72d30axx83hd1a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments