Personal Expense Tracker

v1.0.0

Personal expense tracker - record expenses, auto-categorize, monthly statistics with total and category breakdown

0· 80·0 current·0 all-time
byhaidong@harrylabsj
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (personal expense tracker) match the included Python script and SKILL.md. The code implements add/list/stats and auto-categorization; there are no unrelated capabilities or external service requirements.
Instruction Scope
SKILL.md instructs running the included script (add/stats/list). The script reads/writes local files (writes to ~/.expense-tracker/expenses.json and creates data/sample.json relative to the repo). This file I/O is expected for the stated purpose but worth noting because data is stored locally in plaintext JSON.
Install Mechanism
No install specification; the skill is instruction-only with a bundled script. Nothing is downloaded or executed outside of the provided files.
Credentials
The skill requests no environment variables, credentials, or config paths. It only uses the user's home directory to store data, which is proportionate to a local expense tracker.
Persistence & Privilege
The skill is not always-enabled and does not modify other skills or system settings. It creates a hidden directory under the user's home and a local sample file; this is reasonable persistence for storing expenses.
Assessment
This skill appears coherent and local-only, but consider the following before installing: (1) Data is stored unencrypted in ~/.expense-tracker/expenses.json (plaintext JSON). If you need confidentiality or backups, secure or move the file. (2) The repo/homepage/source is unknown — if provenance matters, review the full script yourself or run it in a sandbox. (3) The script writes a sample file under a data/ folder relative to the code; ensure that path is acceptable in your environment. If any of these are unacceptable (sensitive financial data, multi-device sync, encrypted storage), don't use without modification.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c1t6aa32kp5txqxjcbjj7x583k2ct

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments