ensp

v1.1.0

Always use when user asks to create, generate, or design a network topology diagram for eNSP (Enterprise Network Simulation Platform), or mentions creating e...

0· 57·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the instructions: the skill only needs to parse user requests, generate topology XML, and write a .topo file. There are no unrelated binaries, env vars, or credentials requested.
Instruction Scope
SKILL.md stays within scope: parse user intent, create device UUIDs, compute layout, build XML per the included reference, and write the .topo file to the current directory. It does not ask to read unrelated system files, send data to external endpoints, or access secrets.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is downloaded or written to disk by an installer beyond the generated .topo file itself.
Credentials
No environment variables, credentials, or config paths are requested. The declared requirements are minimal and appropriate for generating local topology files.
Persistence & Privilege
always is false and the skill does not request persistent system-level privileges or attempt to modify other skills or agent config. It will write output files to the current working directory as intended.
Assessment
This skill appears coherent and limited to creating local eNSP .topo files. Before using: run the skill in a non-sensitive/isolated working directory (it writes files there), review generated .topo XML if you want to confirm contents before opening in eNSP, and avoid pasting secrets or unrelated credentials into prompts. Because it's an instruction-only skill, there's no installer or network activity to review — the main risk is just the usual file-write behavior, so don't run it from directories containing sensitive files.

Like a lobster shell, security has layers — review code before you run it.

latestvk972zf1rageka3z5vy35ydabt984jn00

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments