Quit Overspending
v1.0.0Break impulse buying habits with spending streaks, urge tracking, and savings milestones
⭐ 1· 1.7k·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name and description match the actual requirements and behavior: an instruction-only no-spend/urge-tracking helper that needs no binaries, env vars, or external services.
Instruction Scope
SKILL.md describes logging urges, tracking streaks, goals, and savings but does not specify any file paths, storage format, or retention policy. It explicitly promises data stays local, but provides no mechanism or instructions for local storage or deletion — this is a privacy claim the runtime/platform must enforce, not something the skill demonstrates.
Install Mechanism
No install spec and no code files — lowest risk for disk writes or remote code execution.
Credentials
No environment variables, credentials, or config paths requested. The scope of requested access is minimal and proportional to the described functionality.
Persistence & Privilege
always is false and the skill is user-invocable. Model invocation is allowed (platform default) but there is no unusual persistent privilege or cross-skill config changes requested.
Assessment
This skill appears coherent and low-risk from a permission perspective, but its privacy promise is not enforced by the SKILL.md itself. Before using: 1) Verify how your agent platform stores conversation/skill data (local disk vs cloud backups, retention, and whether data is included in shared memory or model telemetry). 2) Avoid entering highly sensitive information (full card numbers, bank credentials, account passwords) into the skill until you confirm storage and deletion behavior. 3) If you require guaranteed local-only storage, test by creating a throwaway log entry and locating it on disk or consult platform docs/support. 4) If you want stronger guarantees, prefer an offline client or encrypt exported logs yourself.Like a lobster shell, security has layers — review code before you run it.
latestvk97bnjxvdjjhqzx4x5w447mrd57zw1p5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
