Regex Toolkit
v1.0.0Test, match, extract, replace, explain, and validate regular expressions from the command line. Includes a library of 25+ common patterns (email, URL, IP, ph...
⭐ 0· 92·0 current·0 all-time
byJohn Wang@johnnywang2001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the provided code and SKILL.md. The script implements testing, finding, replacing, validating, and explaining regexes and includes the advertised common patterns. There are no unexpected binaries, services, or credentials requested.
Instruction Scope
SKILL.md instructs running the included Python script with --text, --file, or piped stdin. The instructions and code only read user-specified files or stdin and print results; they do not call external endpoints, access unrelated environment variables, or perform system-wide actions.
Install Mechanism
No install spec is present (instruction-only with an included script). This minimizes risk because nothing is downloaded or written to disk by an installer. The workflow relies on running the bundled Python script, which is appropriate for the stated purpose.
Credentials
The skill requires no environment variables, credentials, or special config paths. The code does not reference secrets or external credentials, so requested permissions are proportionate to a local regex tool.
Persistence & Privilege
always is false and the skill is user-invocable. Autonomous invocation is allowed by default across the platform but this skill does not request elevated or persistent privileges or attempt to modify other skills or system configuration.
Assessment
This appears to be a simple, local Python regex utility—its behavior is limited to text input, files you explicitly provide, and stdout. Before installing or running it in an agent: (1) review the full script (it is included) so you are comfortable it only reads files you pass it and doesn't perform network access; (2) avoid running it on files containing sensitive data unless you trust the environment, since built-in patterns include matches for PII (SSN, credit-card) which could reveal sensitive strings in agent logs or outputs; (3) if you plan to let an autonomous agent invoke the skill, ensure the agent's permissions and data exposure policies are appropriate (the skill itself does not exfiltrate data).Like a lobster shell, security has layers — review code before you run it.
latestvk976567229cbnp0ne63q6g52bd83c0sn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
