Whois Toolkit
v1.0.0Domain WHOIS lookup toolkit for querying registrar, creation/expiry dates, nameservers, status, and registrant info. Use when looking up domain ownership, ch...
⭐ 0· 139·0 current·0 all-time
byJohn Wang@johnnywang2001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included Python script: the code performs socket-based WHOIS queries and parses registrar, dates, nameservers, and registrant fields. No unexplained credentials, binaries, or external deps are requested.
Instruction Scope
SKILL.md directs the agent to run the bundled script with command-line flags. The instructions and script only perform WHOIS queries and formatting; they do not read unrelated files, environment variables, or send data to unexpected endpoints. The server override flag lets a user point to an arbitrary WHOIS server (user-specified input).
Install Mechanism
No install spec or external downloads; the skill is instruction-only with an included script. Nothing is written to disk by an installer step beyond the existing bundle.
Credentials
No environment variables, credentials, or config paths are required. The script does not access hidden secrets or unrelated config.
Persistence & Privilege
The skill does not request persistent/always-enabled presence, does not modify other skills or system configs, and uses no privileged operations.
Assessment
This skill appears to be what it says: a standalone WHOIS lookup tool. Before running, note that: (1) WHOIS queries go over the network to remote WHOIS servers and those servers (and any intermediary) can log the querying IP and requested domain names; (2) the --server option will send queries to whatever host you provide, so avoid pointing it to untrusted endpoints; (3) WHOIS responses can include personal/identifying information depending on the domain and privacy settings; (4) parsing is heuristic and may miss or misinterpret some registrar formats—treat results as informational. If you plan to run it at scale or in an automated agent, consider rate limits and privacy implications. If you have strict security requirements, review the script locally before use and run it in a controlled environment.Like a lobster shell, security has layers — review code before you run it.
latestvk97aw2sj9fcwezzwdbd1jz4hw983a2n4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
