Password Generator
v1.0.0Generate secure random passwords with customizable length, character sets, and quantity using Python's cryptographically secure secrets module.
⭐ 0· 89·0 current·0 all-time
byhaidong@harrylabsj
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the actual code and instructions. The script implements a password generator with length, symbol/number toggles and count — nothing in the files or SKILL.md asks for unrelated access (cloud creds, system config, etc.).
Instruction Scope
SKILL.md instructs running the included Python script from the skill path and documents the same CLI options the code implements. The instructions do not request reading unrelated files, environment variables, or sending data to external endpoints.
Install Mechanism
No install specification is provided (instruction-only with an included script). No downloads, package installs, or archive extraction are present.
Credentials
The skill requires no environment variables, credentials, or config paths. The script also does not access env vars or external secrets; its behavior is local and self-contained.
Persistence & Privilege
Flags show the skill is not forced-always and allows normal user invocation/autonomous invocation by the agent (default). The skill does not request system-wide changes or modify other skills' configuration.
Assessment
This skill appears to be a straightforward, local password generator and does not request credentials or network access. Before installing, consider: (1) generated passwords are printed to stdout — avoid running in shared logging environments or copying them over insecure channels; (2) store generated passwords in a password manager rather than leaving them in plain text; (3) if you want additional guarantees, inspect the included password_generator.py yourself (it is short and readable) and confirm you trust the source. No other red flags were found.Like a lobster shell, security has layers — review code before you run it.
latestvk979dn5qyh72jm302j0s3hwzwd8385w8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
