Browser Fingerprinting
v3.0.2Reference tool for devtools — covers intro, quickstart, patterns and more. Quick lookup for Browser Fingerprinting concepts, best practices, and implementati...
⭐ 0· 320·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (browser fingerprinting reference for devtools) matches the included files: SKILL.md and a small shell script that print reference text. There are no unexpected required binaries, env vars, or network dependencies declared.
Instruction Scope
Runtime instructions and the script produce plain-text documentation via heredocs and do not perform network calls, read arbitrary files, or access credentials. Minor content inconsistencies exist (SKILL.md version 3.0.1 vs registry 3.0.2 and the script's VERSION=3.0.0; cheatsheet references a 'troubleshooting' command that is not implemented; show_help uses a quoted heredoc so $VERSION won't expand). These are quality issues but not security risks.
Install Mechanism
No install spec is present and the skill is instruction-only aside from an included shell script. Nothing is downloaded or extracted at install time, so there is no network install risk.
Credentials
The skill declares no required environment variables or credentials and the code does not read environment variables. One minor note: quickstart text generically mentions 'access credentials' as prerequisites, which is misleading given this skill does not require credentials.
Persistence & Privilege
always is false, the skill does not request persistent presence or modify other skills or system configuration. The included script does not write to disk or store secrets.
Assessment
This skill is a static reference: it prints documentation from embedded heredocs and does not access the network or any credentials. It's coherent with its stated purpose. Before installing, you may want to: (1) inspect the script yourself (it is small and readable), (2) note the minor version/command-name inconsistencies (documentation bugs, not security issues), and (3) run it in a sandbox if you prefer. There are no environment variables, downloads, or persistent privileges requested.Like a lobster shell, security has layers — review code before you run it.
latestvk9767cn5pj3wtncgcrrsaerr4983he0s
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
