Inventory
v1.0.0Build a personal inventory system for home items, valuables, and equipment tracking.
⭐ 2· 1.4k·5 current·5 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (personal inventory) align with the instruction-only content: creating ~/inventory/, organizing item files, tracking location/value/warranty, photos, receipts, and simple filters. There are no unrelated required binaries, env vars, or installs.
Instruction Scope
SKILL.md is scoped to cataloging items and creating a ~/inventory/ workspace. It suggests storing photos, receipts, and purchase confirmation emails but does not explicitly instruct the agent to access the user's mailboxes or other private services. This is slightly open-ended: the agent may need user-supplied files or explicit permission before reading local files or external accounts. No explicit instructions to exfiltrate data appear.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing will be downloaded or written by an installer; risk from installation is minimal.
Credentials
The skill declares no required environment variables, credentials, or config paths. Requested capabilities (file creation under the user's home directory) are proportionate to the stated purpose.
Persistence & Privilege
always is false and the skill does not request elevated or permanent platform privileges. Autonomous invocation is allowed by default but is normal; the skill does not modify other skills or system-wide config.
Assessment
This skill appears coherent and low-risk, but review how it will store sensitive data before use. Expect it to create a ~/inventory/ directory and to ask you to upload or provide photos, receipts, and serial numbers — it does not declare access to your email or passwords, so do not give credentials. If you intend to catalog high‑value items, consider storing the inventory in an encrypted folder or backup, and deny any requests to access external mailboxes or cloud drives unless you explicitly trust and authorize that action.Like a lobster shell, security has layers — review code before you run it.
latestvk970k4kx0nmrp67258gdjzp33580zky0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📦 Clawdis
OSLinux · macOS · Windows
