ensp
v1.1.0Always use when user asks to create, generate, or design a network topology diagram for eNSP (Enterprise Network Simulation Platform), or mentions creating e...
⭐ 0· 59·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (generate eNSP topology files) match the SKILL.md and included references. The skill does not request unrelated binaries, credentials, or config paths.
Instruction Scope
Runtime instructions are narrowly scoped to parsing user requests, generating device UUIDs, computing layout, building the .topo XML using the provided reference, writing the file to the current directory, and printing the path. The instructions do not direct reading unrelated system files, accessing credentials, or transmitting data to external endpoints.
Install Mechanism
No install spec — instruction-only. No downloads or archive extraction; nothing is written to disk by an installer. Lowest-risk install profile.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. That matches the stated function of producing local .topo files.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or elevated privileges. It will write files to the current directory (expected for this purpose).
Assessment
This skill appears coherent and limited to producing .topo files for eNSP. Things to keep in mind before installing/using: 1) The agent will write files to the current working directory — review generated .topo files before opening them in eNSP if they might contain sensitive topology details. 2) The skill can be invoked autonomously by the agent (normal default); if you prefer manual control, disable autonomous invocation in your agent settings. 3) Because it is instruction-only, there is no bundled code to audit beyond the included SKILL.md and reference — if you need higher assurance, inspect sample outputs or request the agent to show the generated XML before saving.Like a lobster shell, security has layers — review code before you run it.
latestvk97fefq1t8fmatbvkfbmzfdd0584kqe8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
