Jrv Yaml Toolkit

v1.0.0

Full-featured YAML toolkit for validating, formatting, converting, merging, and querying YAML files. Supports YAML-to-JSON, JSON-to-YAML, schema validation,...

0· 92·0 current·0 all-time
byJohn Wang@johnnywang2001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description align with the included script: the Python CLI implements validate/format/convert/get/set/merge/lint/keys/minify and supports the documented use cases.
Instruction Scope
SKILL.md instructs the agent to run the bundled script on user-provided files. The instructions do not ask the agent to read unrelated system files, environment variables, or send data externally.
Install Mechanism
There is no install spec (instruction-only), which is lowest risk, but the script requires PyYAML (it exits with an error if pyyaml is missing). The registry metadata did not declare this dependency explicitly—user must install pyyaml themselves.
Credentials
The skill requests no environment variables, no credentials, and references only the files passed on the command line. No excessive or unrelated secrets or paths are requested.
Persistence & Privilege
always is false and the skill does not attempt to modify other skills or system-wide agent settings. It writes only to stdout or to a user-specified output file.
Assessment
The skill appears internally consistent and implements a local YAML CLI without network calls or credential access. Before installing: (1) be aware the package source has no homepage and unknown owner—review the bundle yourself if you can; (2) install PyYAML (pip install pyyaml) before use; (3) run the tool on non-sensitive files first and/or in a sandbox, and keep backups before using commands that write output (set/merge/from-json with --output). If you need higher assurance, request a full code review of the complete script (the listing was truncated at the CLI wiring) or ask the author for a source repo or homepage.

Like a lobster shell, security has layers — review code before you run it.

latestvk97439evbxq14c4n5dm8e5242x834p3t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments