Log Analyzer
v1.0.0Parse, search, and analyze application logs across formats. Use when debugging from log files, setting up structured logging, analyzing error patterns, correlating events across services, parsing stack traces, or monitoring log output in real time.
⭐ 5· 5k·68 current·70 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (log parsing, stack traces, real-time monitoring) match the requested tools (grep, awk, jq, python3) and the commands shown. There are no unrelated credentials, config paths, or binaries requested.
Instruction Scope
SKILL.md contains concrete shell snippets and a small Python parser that operate on log files (app.log, /var/log/...). Instructions read and filter logs, parse JSON lines, and tail files — all within the stated scope. The instructions do not attempt to read unrelated system configs, secrets, or contact external endpoints.
Install Mechanism
No install spec and no code files are included beyond the instruction text, so nothing is written to disk and nothing is downloaded or installed by the skill itself.
Credentials
The skill declares no environment variables or credentials. The required binaries are appropriate for text/log processing. There are no disproportionate or unexplained secret requests.
Persistence & Privilege
always:false and no install operations or configuration writes are requested. Autonomous invocation is allowed by platform default but is not combined with other concerning privileges here.
Assessment
This is an instruction-only log analysis guide that looks coherent and low-risk. Before using: (1) remember the commands read local log files (e.g., /var/log, app.log) which may contain sensitive data (PII, tokens, IPs); run snippets in a safe/test environment first if you're unsure; (2) some commands assume GNU utilities (grep -P, date -d) and behavior may vary on BSD/macOS — check portability; (3) because this skill reads files, ensure the agent/process has only the filesystem access you intend; (4) review and, if needed, adapt the shell snippets to your environment rather than running them verbatim. If you want stronger guarantees, run the provided commands locally under your control rather than granting any agent broad filesystem access.Like a lobster shell, security has layers — review code before you run it.
latestvk972qka0qpzcrg86y9krk9py4s80f4d0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📋 Clawdis
OSLinux · macOS · Windows
Any bingrep, awk, jq, python3
