Json Schema Toolkit

v1.0.0

Validate JSON data against JSON Schema, generate schemas from sample JSON, and convert schemas to TypeScript interfaces, Python dataclasses, or Markdown docs...

0· 95·0 current·0 all-time
byJohn Wang@johnnywang2001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included script and SKILL.md: the Python script implements schema generation, validation, and conversion to TypeScript/Python/Markdown, which is exactly what the skill advertises. No unexpected dependencies or credentials are requested.
Instruction Scope
SKILL.md tells the agent to run the included scripts/json_schema.py with explicit commands and supports stdin; it does not instruct the agent to read unrelated files, environment variables, or send data to external endpoints. The runtime instructions are narrowly scoped to the described tasks.
Install Mechanism
No install spec; this is an instruction-only skill that bundles a Python script. The script uses only Python standard-library modules (re, json, argparse, dataclasses, typing, etc.) and there are no downloads or external installers referenced.
Credentials
The skill declares no required environment variables, credentials, or config paths. The code shown does not attempt to access secrets or remote services; its I/O is local file/stdin/stdout-based and proportional to its purpose.
Persistence & Privilege
always is false and the skill does not request elevated or persistent platform privileges. There are no instructions to modify other skills or global agent settings.
Assessment
This skill appears coherent and self-contained, but as with any code you run: (1) review the full scripts/json_schema.py source before executing, (2) run it in a sandboxed environment or isolated virtualenv if you will process sensitive data, and (3) if you plan to use it in automated/long-running agents, monitor network activity and subprocess usage to ensure no unexpected behavior appears (the shipped code shows no network calls in the visible portion). If you want extra assurance, run a static scan on the complete file to confirm there are no hidden I/O or external calls in the truncated portion.

Like a lobster shell, security has layers — review code before you run it.

latestvk973p0vmn6mzsnax9wfjbbjnt583612j

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments