Chen Image
v1.0.0Create, inspect, process, and optimize image files and visual assets with reliable format choice, resizing, compression, color-profile, metadata, and platfor...
⭐ 0· 127·0 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and all included files (web.md, social.md, commands.md, etc.) consistently describe image inspection, processing, and export workflows. There are no unrelated environment variables, binaries, or config paths required. Minor metadata inconsistency: the registry-owner ID in the provided registry metadata (kn78hge5...) does not match the ownerId in _meta.json (kn73vp5...), which is a small packaging/integrity mismatch to be aware of but does not change the technical behavior.
Instruction Scope
SKILL.md and the companion docs only instruct image-related tasks (format choice, resizing, metadata, platform-specific exports) and include concrete command examples for ImageMagick, Pillow, svgo, sharp, exiftool, ffmpeg, and macOS sips. The instructions do not direct the agent to read arbitrary system files, environment variables, or transmit data to unexpected external endpoints. They do include batch/overwrite examples and explicit warnings about npx (remote package execution) and exiftool operations.
Install Mechanism
No install spec and no code files — it's instruction-only, so nothing will be written or fetched by an automated installer. Low installation risk.
Credentials
The skill requests no environment variables, credentials, or config paths. All guidance is local and task-focused; there are no disproportionate secret or credential requests.
Persistence & Privilege
always:false and default agent invocation are used. The skill does not request permanent system presence, nor does it modify other skills or global agent settings in the provided files.
Assessment
This skill appears coherent and instruction-only, but take normal precautions before running commands on your system: 1) Inspect command examples before executing — batch commands (mogrify, mogrify -resize, exiftool -all=, etc.) can overwrite or irreversibly alter files; run against copies or use --overwrite flags intentionally. 2) npx examples run remote code from npm — only use those in trusted environments or install audited packages locally. 3) exiftool can strip GPS/metadata; follow the docs' privacy guidance if sharing images. 4) If you allow an autonomous agent to invoke the skill, ensure it has explicit permission to access your local files and check any actions it proposes before it runs them. 5) Note the minor registry/_meta ownerId mismatch — it may just be packaging churn, but if provenance matters, verify the publisher (homepage and registry owner) before trusting the skill in sensitive pipelines.Like a lobster shell, security has layers — review code before you run it.
latestvk97cz2m28j1c174zzbk6ghqcf983dzkv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🖼️ Clawdis
OSLinux · macOS · Windows
