Claw SQLite Knowledge
v1.0.0Knowledge base skill that wraps the clawsqlite knowledge CLI for ingest/search/show.
⭐ 0· 256·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description match the implementation: this is a thin JSON wrapper that forwards ingest/search/show requests to the `clawsqlite` knowledge CLI. The bootstrap script and runtime exist solely to ensure `clawsqlite` is installed and callable.
Instruction Scope
SKILL.md and runtime scripts limit actions to ingest_url, ingest_text, search, show, and a few maintenance/report actions. All runtime actions are executed by running `python -m clawsqlite_cli knowledge ...` with arguments built from the JSON payload. It does not read arbitrary host files or environment variables beyond standard workspace config and PYTHONPATH manipulation for the local prefix.
Install Mechanism
Installation uses a small bootstrap script that runs `pip install 'clawsqlite>=1.0.0'`, falling back to a workspace-local prefix if the base env is not writable. This is an expected, minimal install mechanism for a Python wrapper, but it does bring in third-party code from PyPI (supply‑chain risk).
Credentials
The skill declares no required env vars or credentials. ENV_EXAMPLE.md documents optional environment variables (embedding API, small LLM, scraper command) that are relevant to clawsqlite's features; these are optional and appropriate to the skill's purpose.
Persistence & Privilege
always:false and normal model invocation are used. The skill does not modify other skills or system-level config. It may install into the runtime Python environment (or a workspace prefix) which is standard for this class of skill.
Assessment
This skill is a thin, auditable wrapper around the public `clawsqlite` PyPI package and is internally consistent with its stated purpose. Before installing, consider: (1) supply‑chain risk — the bootstrap will run `pip install` and pull code from PyPI; review the `clawsqlite` project (source, maintainers, recent releases) or pin to a vetted version and install in an isolated environment. (2) Runtime scope — the skill delegates fetching to a configured scraper (CLAWSQLITE_SCRAPE_CMD); ensure that scraper is trusted and that agents are not directed to ingest arbitrary untrusted URLs you wouldn't want fetched. (3) Secrets — embedding/LLM features require API keys if you enable them; only provide such keys to trusted providers. (4) Command safety — the wrapper uses subprocess.run with argument lists (not shell=True), which lowers command‑injection risk, but CLI parsing behavior can still be affected by specially crafted arguments; run in a restricted runtime or sandbox if you need strong isolation. If you need maximum assurance, run the bootstrap step manually in an isolated virtualenv/container and review the installed clawsqlite package before granting the skill broader runtime privileges.Like a lobster shell, security has layers — review code before you run it.
latestvk9730fdh1kxe16979t8a5zgzes84an3n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
