JoeVault

v1.0.0

Audit, classify, and quarantine stale paths after a profile switch, account migration, reset, or workspace move. Use when OpenClaw, Claude, WSL, Windows home...

0· 43·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description describe auditing and quarantining stale paths; the included scripts (audit_paths.py and quarantine_path.py) perform exactly those tasks (scanning paths, reporting metadata, and moving paths into an archive). There are no unrelated requirements (no external credentials or binaries).
Instruction Scope
SKILL.md instructs running the two scripts and to inspect results before moving. The audit script scans the provided search-root paths and reads file contents to find references to the stale root — this is expected for the stated purpose but means the script will read arbitrary files under the supplied search roots (which can include sensitive configuration). The instructions do not send data elsewhere.
Install Mechanism
No install spec — instruction-only with included Python scripts. Nothing is downloaded or installed from external URLs. This is low-risk from an installation-perspective; the only runtime requirement is a Python 3 interpreter present on the system.
Credentials
The skill requests no environment variables, credentials, or config paths. The scripts operate solely on paths supplied by the user — proportional to the stated purpose.
Persistence & Privilege
always:false (default) and no special privileges requested. However, the scripts do modify the filesystem (shutil.move) and will move/rename user data when invoked. While autonomous invocation is allowed by default, that is a platform behavior rather than a property of the skill; exercise caution if you permit the agent to run skills autonomously because this skill can change or move files.
Assessment
This skill appears coherent and does what it claims, but it will read and move files you point it at — including configuration files under the search roots. Before running: 1) inspect the audit output (it prints a JSON report) and limit --search-root to only the directories you want scanned; 2) do not run the quarantine script on large or ambiguous trees without inventorying them first; 3) run a safe test (small dummy folder) to confirm behavior; 4) do not run as an elevated user (root/Administrator) unless absolutely necessary; 5) keep backups of important data before moving anything; and 6) if you do not trust the agent to act autonomously, disable autonomous skill invocation or only invoke the scripts manually.

Like a lobster shell, security has layers — review code before you run it.

archivevk9788et1dvj8fh8q063mysm6fx83yvpycleanupvk9788et1dvj8fh8q063mysm6fx83yvpylatestvk9788et1dvj8fh8q063mysm6fx83yvpymigrationvk9788et1dvj8fh8q063mysm6fx83yvpyopenclawvk9788et1dvj8fh8q063mysm6fx83yvpywindowsvk9788et1dvj8fh8q063mysm6fx83yvpywslvk9788et1dvj8fh8q063mysm6fx83yvpy

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments