Ssl Certificate Monitor
v1.0.0Monitor SSL certificates for expiration, security issues, and compliance across domains and subdomains.
⭐ 0· 220·1 current·1 all-time
byDerick@derick001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included Python CLI (scripts/main.py) which fetches and parses certificates. Required binary (python3) and the optional cryptography dependency are appropriate for the stated purpose.
Instruction Scope
SKILL.md instructs the agent to run the included CLI to check domains or read domain lists from files. The runtime instructions and the code only read the provided domain list files and perform TLS handshakes to target hosts — consistent with the stated monitoring task and not attempting unrelated system access or external telemetry.
Install Mechanism
No install spec is provided (instruction-only in registry) and the shipped script only requires Python and the cryptography library. Requiring pip installation of cryptography is proportional for certificate parsing. No downloads from untrusted URLs or archive extraction are present.
Credentials
The skill declares no required environment variables, and the code does not read secrets or unrelated env vars. It only accesses local domain list files provided by the user and makes network connections to target hosts, which is expected behavior.
Persistence & Privilege
The skill is not always-enabled and is user-invocable. It does not modify other skills or system-wide configuration and requests no persistent privileges.
Assessment
This appears to be a straightforward command-line SSL certificate checker. Before installing, consider: (1) It will make outbound TLS connections to any domains you supply (including internal hosts) — avoid scanning hosts you don't control. (2) It requires the Python 'cryptography' package for full parsing; install via pip if needed. (3) Review or test the included scripts in a controlled environment — there are some implementation rough edges (e.g., parsing fallbacks and attribute names) but nothing that indicates hidden telemetry or credential exfiltration. (4) The tool does not provide built-in notifications, revocation checks, or CT log checking — integrate its JSON output into your monitoring/alerting pipeline if needed.Like a lobster shell, security has layers — review code before you run it.
latestvk97fzwqcm71mpq8qb8dbbsyr3s82cs6a
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binspython3
