团队周报助手 / Team Weekly
v1.0.0团队周报助手 — 自动收集团队工作进展,生成结构化周报/月报
⭐ 0· 100·0 current·0 all-time
byJun Zhang@hanjing5024064
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (team weekly reports, worklog management, analysis) match the included scripts and the declared optional environment variables. The code only manipulates team and worklog data and generates Markdown/Mermaid reports; there are no unrelated credentials, cloud APIs, or unexpected binaries required.
Instruction Scope
SKILL.md instructions direct the agent to run the included Python scripts which read/write JSON under TW_DATA_DIR (default ~/.openclaw-bdi/team-weekly). The instructions and code access only the project data directory and optional subscription env var. Note: the skill will create and persist data files on the host filesystem (team.json, worklogs.json) — this is expected but worth noting for privacy.
Install Mechanism
No install spec or external downloads. The skill is delivered as Python scripts and intended to run with the system Python standard library (no third‑party packages). No high-risk install mechanisms are present.
Credentials
Only optional environment variables (TW_SUBSCRIPTION_TIER, TW_DATA_DIR) are referenced. No secrets, tokens, cloud credentials, or unrelated env vars are requested. The default data directory is under the user's home directory, which is appropriate for this local tool.
Persistence & Privilege
The skill persists data to the filesystem under its own data directory and updates those files (team/worklogs). always is false and it does not modify other skills or system-wide agent settings. Persisting user/team logs is expected behavior, but users should be aware data is stored locally and retained between runs.
Assessment
This skill is internally consistent and appears safe from the standpoint of unexpected network access or extraneous credential requests. Before installing: (1) review or run the bundled Python scripts locally if you want to inspect behavior; (2) be aware the tool stores team and worklog JSON files in TW_DATA_DIR (default ~/.openclaw-bdi/team-weekly/) — if that directory is shared or backed up you may want to set TW_DATA_DIR to a controlled location and restrict its filesystem permissions; (3) no network exfiltration code was found, but always avoid putting highly sensitive personal credentials or PII into unencrypted local files managed by third-party skills; (4) if you plan to let the agent invoke this autonomously, remember it will be able to create/modify those local files when invoked.Like a lobster shell, security has layers — review code before you run it.
hrvk97dq9m2sj4np5n6ksq102e7th8376pnlatestvk97dq9m2sj4np5n6ksq102e7th8376pnproductivityvk97dq9m2sj4np5n6ksq102e7th8376pnteam-managementvk97dq9m2sj4np5n6ksq102e7th8376pnweekly-reportvk97dq9m2sj4np5n6ksq102e7th8376pn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
