Finality
v1.0.0Analyze finality operations. Use when you need to understand finality mechanisms, evaluate protocol security, or reference on-chain concepts.
⭐ 0· 86·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (analyzing finality operations, on-chain concepts) align with the included CLI: the SKILL.md instructs the agent to run a local script that records, lists, searches, and exports user entries. There are no unrelated credentials, binaries, or services requested.
Instruction Scope
Runtime instructions only call scripts/script.sh with defined commands (status, add, list, search, remove, export, stats, config, help, version). The script operates only on a configurable data directory and does not read other system config, environment variables beyond FINALITY_DIR/HOME, or send data externally.
Install Mechanism
No install spec is provided (instruction-only). The shipped shell script is executed in-place; nothing is downloaded or extracted from external sources.
Credentials
The skill requests no environment variables or credentials. The script uses FINALITY_DIR (optional) and falls back to $HOME/.finality, which is proportional to its function. There are no requests for unrelated secrets or system-wide credentials.
Persistence & Privilege
The skill is not always-enabled and does not modify other skills or system-wide agent settings. It persists only its own data under the user's data directory (default ~/.finality).
Assessment
This skill is a small local command-line tool: it will create and modify files under ~/.finality (or a directory you set via FINALITY_DIR). It does not contact external servers or request credentials. If you plan to install or run it, review or trust the script contents (scripts/script.sh) because the agent will execute that shell script; otherwise the behavior is straightforward and confined to the specified data directory.Like a lobster shell, security has layers — review code before you run it.
latestvk97ezy87vt55g2cc3vfj5t42a183b2q1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
