Jrv Mock Data
v1.0.0Generate realistic fake/mock data for testing and development. Supports names, emails, addresses, phone numbers, UUIDs, dates, lorem ipsum, credit cards, com...
⭐ 0· 101·0 current·0 all-time
byJohn Wang@johnnywang2001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (mock data generator) matches the shipped code: a single Python script with many field generators and output formatters. One small inconsistency: the top-level description and brief header mention credit cards, but I do not see any credit card generator in the code or the documented data-type table. This looks like a documentation mismatch rather than malicious behavior.
Instruction Scope
SKILL.md instructs running the included script (python3 scripts/mock_data.py) with flags and saving output; the script only reads its arguments and writes output (stdout/file). There are no instructions to read unrelated files, environment variables, or to send data to external endpoints.
Install Mechanism
No install spec — instruction-only skill with a bundled script. No downloads, package installs, or archive extraction. Running the script runs local Python only.
Credentials
No required environment variables, no credentials, and the script does not access environment-specific config. The requested capabilities are proportional to a local mock-data generator.
Persistence & Privilege
always is false and model invocation is normal. The skill does not request persistent system changes or modify other skills/configs.
Assessment
This skill is self-contained and appears safe to run locally: it generates fake names, emails, addresses, UUIDs, etc., and does not call the network or request secrets. Before installing/using: (1) note the documentation mentions credit-card generation but the code does not include it — ask the author if you need that feature; (2) avoid seeding production systems with this synthetic data where it could be mistaken for real user data, and do not mix generated records with real PII; (3) inspect any future versions for added network calls or requests for credentials before trusting them; and (4) run the script in a restricted/dev environment if you want extra caution.Like a lobster shell, security has layers — review code before you run it.
latestvk977n6996kk1mm87pe6n34877d8355mq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
