EASA Regulatory Search

v1.0.0

Query EASA Easy Access Rules locally with exact reference lookup, full-text search, and semantic search. Use when answering EASA regulatory questions, retrie...

1· 101·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the runtime instructions: the skill is an instruction-only wrapper around a local `claw-easa` CLI that performs exact-reference, full-text, and semantic search over EASA material. The files only require a local Python runtime and the upstream project; there are no environment variables, unrelated binaries, or unexpected credentials requested.
Instruction Scope
Runtime instructions tell the agent to call a local CLI (`claw-easa`) and to consult included reference docs. Commands include ingest/fetch/parse, search, and status checks. These actions are within the stated scope (downloading and indexing EASA ZIP/XML/FAQ pages and querying them). The instructions do allow crawling EASA FAQ pages and fetching archives (including an explicit `--url` override), which is consistent with ingestion behavior but worth noting as a network activity.
Install Mechanism
The skill package itself has no install spec (instruction-only), but the docs recommend cloning and running bootstrap scripts from https://github.com/dmoraine/clawEASA.git. Using a GitHub repo and provided scripts is expected for a Python CLI, but it does mean installation executes upstream scripts and installs Python packages (e.g., CPU Torch) from external sources. This is proportionate to a local runtime requirement but is the main place to review before running.
Credentials
The skill declares no required environment variables, credentials, or config paths. The operations described (web crawling, downloading EASA archives, parsing, local indexing) do not require secrets. No environment access appears unjustified by the skill purpose.
Persistence & Privilege
always:false and model invocation not disabled — normal for an agent-invocable skill. The package does not request persistent system-wide changes beyond advising copying the skill folder into the OpenClaw workspace; it does not modify other skills or request elevated privileges.
Scan Findings in Context
[no_code_to_scan] expected: The regex scanner had no code files to analyze because this is an instruction-only skill. That is expected; the runtime behavior depends on an external Python CLI repository referenced in the docs.
Assessment
This skill is coherent with its purpose, but it relies on an external Python project and runs network operations for ingestion. Before installing: (1) review the upstream GitHub repo and the bootstrap scripts (./scripts/bootstrap-local-runtime.sh and ./scripts/install-openclaw-skill.sh) to ensure you trust them, (2) run installs inside a dedicated virtualenv and not as root, (3) be cautious with the ingest command's `--url` option — only fetch archives from trusted sources, and (4) expect the skill to make outbound requests to EASA and to download/parse ZIP/XML FAQ pages for indexing.

Like a lobster shell, security has layers — review code before you run it.

aviationvk9701mxbw9tn9ych1mmh3enf6d83g1ptcompliancevk9701mxbw9tn9ych1mmh3enf6d83g1ptearvk9701mxbw9tn9ych1mmh3enf6d83g1pteasavk9701mxbw9tn9ych1mmh3enf6d83g1ptlatestvk9701mxbw9tn9ych1mmh3enf6d83g1ptregulationsvk9701mxbw9tn9ych1mmh3enf6d83g1pt

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments