1.2.0
v1.2.0Data quality validation patterns for daily checks and anomaly follow-up.
⭐ 0· 353·3 current·3 all-time
byYikun Fu@jiarani
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The SKILL.md, templates, and tiny helper scripts are coherent with a data-quality operations checklist/reporting skill. However, the top-level name shown as "1.2.0" and the healthcheck script echoing a different skill name ("pipiwu-benchmark-delta-skill") look like copy-paste or packaging lapses—these are sloppy but not inherently dangerous.
Instruction Scope
Runtime instructions are limited to running external commands (dq profile/validate/anomaly and workflow checklist/report) and using included templates; the SKILL.md does not instruct reading unrelated system files or exporting data to unknown endpoints. Note: the actual behavior depends on what the external 'dq' and 'workflow' binaries/tools do—those tools could contact services or require credentials, but that is outside this skill's files.
Install Mechanism
There is no install spec and only two tiny shell scripts plus templates are included. No downloads or archive extraction are present.
Credentials
The skill declares no required environment variables, no credentials, and the SKILL.md does not reference any secrets or unexpected env vars. This is proportionate for a checklist/reporting template skill.
Persistence & Privilege
The skill is not always-enabled and does not request elevated persistence. Model invocation is allowed (default), which is normal for user-invocable skills and not a red flag here.
Assessment
This skill appears to be a set of runbooks/templates for data-quality checks and is internally consistent. Before installing, verify what the 'dq' and 'workflow' commands are on your system (which binaries or services they map to), and confirm you trust those tools — they will perform the actual work and might require credentials or network access. Also note the small naming inconsistencies (package name/version/healthcheck text) which look like copy-paste errors; they are not dangerous but you may want to ask the publisher to correct them for clarity.Like a lobster shell, security has layers — review code before you run it.
latestvk973mch5e8ak7r2vrzgcye3zjx82faaj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
