Design Tool
v2.0.0Penpot: The open-source design tool for design and code collaboration design-tool, clojure, clojure, clojurescript, design, prototyping.
⭐ 0· 95·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (design logging) aligns with the included script and SKILL.md. The script implements per-command logs, a history log, search, stats, and export functionality as described. No unrelated services, binaries, or credentials are requested.
Instruction Scope
SKILL.md and the script confine operations to the user's data directory (~/.local/share/design-tool). Commands read and write local .log files and perform grep/tail/du/wc, matching the documented behavior. There are no instructions to read unrelated system files or to transmit data externally.
Install Mechanism
No install spec is provided (instruction-only with an included script). Nothing is downloaded from the network or written to system locations beyond the user's home directory. This is a low-risk install posture.
Credentials
The skill requires no environment variables, credentials, or config paths. It uses standard shell utilities and $HOME implicitly for the data directory, which is appropriate for a per-user CLI logger.
Persistence & Privilege
The skill is not always-enabled and does not request elevated privileges or system-wide configuration changes. It creates and manages files only inside the user's home data directory.
Assessment
This skill appears to be a straightforward local logging tool. Before installing/running: (1) review the included scripts (scripts/script.sh) yourself; (2) be aware it will create and append plaintext logs under ~/.local/share/design-tool (do not log secrets or sensitive data); (3) exported files are created unencrypted in that directory; (4) there are minor bugs/quirks in the script (e.g., JSON export may produce an escaped \n) — treat it as a small utility rather than hardened production software. If you need networked backups or secret handling, do not rely on this tool without modifying it.Like a lobster shell, security has layers — review code before you run it.
latestvk97fjh90tvxye9wb3qpfsmj8k9837v3m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
