Shell Scripting

v1.0.0

Write robust, portable shell scripts. Use when parsing arguments, handling errors properly, writing POSIX-compatible scripts, managing temp files, running commands in parallel, managing background processes, or adding --help to scripts.

1· 3.9k·28 current·29 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (shell scripting guidance) match the contents: templates, argument parsing, traps, temp handling, parallelism and portability. The only declared runtime requirement is bash, which is exactly what the instructions use.
Instruction Scope
SKILL.md stays on-topic: it provides recipes and examples for writing and running shell scripts. Examples do reference environment variables (e.g., API_KEY) and network commands (curl) but only as realistic examples; the instructions do not tell the agent to read arbitrary system files, exfiltrate data, or send user secrets to external endpoints.
Install Mechanism
No install spec and no code files — instruction-only skills have minimal surface area. Nothing is downloaded or written to disk by the skill itself.
Credentials
Requires no environment variables or credentials. Example snippets show how to require an API_KEY, which is normal for sample code and proportional to the topic; nothing requests unrelated credentials.
Persistence & Privilege
always is false and the skill does not request persistent or elevated platform privileges. It does not modify other skills or system-wide settings.
Assessment
This skill is a cookbook for writing bash scripts and appears coherent. Before using templates or running scripts you or the agent generate, review them — particularly any sections that call network endpoints (curl/wget) or reference environment secrets (API_KEY). The examples showing require‑style environment checks are normal samples; do not paste real secret values into unreviewed scripts, and prefer running new scripts in a safe environment (non-root, or a container) until you confirm they do only what you expect.

Like a lobster shell, security has layers — review code before you run it.

latestvk973g7z0tezhy5gmksrz6aw32d80e54z

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🐚 Clawdis
OSLinux · macOS · Windows
Binsbash

Comments