ensp

v1.1.0

Always use when user asks to create, generate, or design a network topology diagram for eNSP (Enterprise Network Simulation Platform), or mentions creating e...

0· 44·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (eNSP topology generator) matches the content: SKILL.md and references describe building .topo XML, UUIDs, layout, device models, and writing a file. No unrelated environment variables, binaries, or config paths are requested.
Instruction Scope
Runtime instructions are narrowly scoped to parsing the user request, generating topology XML, and writing a .topo file. The SKILL.md references only local file creation (Write tool) and a local reference doc. It does not instruct reading unrelated files, calling external endpoints, or accessing secrets.
Install Mechanism
There is no install spec or code to download; the skill is instruction-only and will not write or execute external code during install.
Credentials
The skill declares no required environment variables, credentials, or config paths. The actions described (UUID generation, layout calculation, XML assembly, writing a .topo) require no secrets and are proportionate to the purpose.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges or modify other skills' configuration. Autonomous invocation is allowed (platform default) and appropriate for a user-invocable generator.
Assessment
This skill appears to do exactly what it says: generate .topo files for eNSP. Before installing, confirm your agent environment provides a safe, limited Write tool (so generated files go only to the intended workspace). Review any generated .topo file before opening it in eNSP (just in case), and avoid granting the agent broad filesystem or credential access — this skill does not need them.

Like a lobster shell, security has layers — review code before you run it.

latestvk978w9gmtz688mk4bd38r1pm4984eker

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments