Multi Summarize

v1.3.1

Fast multi-format summarization — paste a URL, drop a file, get the key points. Powered by evolink.ai

0· 128·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The skill claims to summarize URLs, PDFs, audio, and video via Evolink.ai and the script implements exactly that: content extraction + POST to api.evolink.ai using an EVOLINK_API_KEY. Required binaries (curl, python3, realpath, file, stat) and optional extraction tools are appropriate for the stated purpose.
Instruction Scope
Runtime instructions and the script stay within the summarization scope: they extract content, build a prompt, and call the Evolink API. The script will fetch remote content and will send extracted local-file contents to the external API. It enforces a sandbox directory (SUMMARIZE_SAFE_DIR) and blacklists some sensitive filenames, but it will still transmit any allowed file's contents to api.evolink.ai — this is expected but important to notice.
Install Mechanism
No install spec and only a small bash script are provided. Nothing is downloaded or written to disk by an installer step. This is low-risk from an install-mechanism perspective.
Credentials
The script requires an EVOLINK_API_KEY (and optionally EVOLINK_MODEL and SUMMARIZE_SAFE_DIR), which is proportionate for a cloud summarization service. There is a minor inconsistency: top-level registry metadata earlier stated 'Required env vars: none', whereas _meta.json and SKILL.md clearly expect EVOLINK_API_KEY. No unrelated secrets are requested.
Persistence & Privilege
The skill does not request elevated or persistent system privileges, does not set always:true, and does not modify other skills or system settings. Autonomous invocation is allowed (platform default) but not excessive here.
Assessment
This skill is coherent with its stated purpose, but before installing: 1) Confirm you're comfortable sending extracted content (including local files inside SUMMARIZE_SAFE_DIR) to https://api.evolink.ai and review Evolink's privacy policy. 2) Only place files you are willing to share in the configured safe directory (SUMMARIZE_SAFE_DIR). 3) Note the script blacklists some common sensitive filenames but the blacklist is not exhaustive — do not store secrets or private keys in the workspace. 4) Be aware the top-level registry metadata appears to omit required env vars even though the script requires EVOLINK_API_KEY; ensure you set that env var from a trusted source. 5) If you need stronger guarantees, inspect or modify the script to add additional filename/content checks or to run against a self-hosted/approved API endpoint.

Like a lobster shell, security has layers — review code before you run it.

latestvk9789p5nn6wkz6n5aj4rnf6wth83accz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments