shapefile
v1.0.0Inspect, explain, validate, and convert ESRI Shapefile datasets, including `.shp/.shx/.dbf/.prj` sidecar requirements, CRS detection, field-name/type limits,...
⭐ 0· 79·0 current·0 all-time
by@jvy
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (Shapefile inspection, validation, conversion guidance) align with the SKILL.md and the included reference patterns. It does not request unrelated credentials, binaries, or config access.
Instruction Scope
Runtime instructions are limited to guidance, checks, and routing heavy operations to qgis; they reference the included references/patterns.md only. There are no instructions to read arbitrary system files, gather credentials, or transmit data to external endpoints.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing will be written to disk or downloaded during install.
Credentials
The skill declares no required environment variables, credentials, or config paths. The guidance and patterns do not depend on hidden secrets.
Persistence & Privilege
always is false and there are no instructions to modify agent or system config. The agent metadata sets allow_implicit_invocation (normal for skills) but that is not combined with any broad access requests.
Assessment
This skill is primarily a knowledge/recipe document for dealing with Shapefiles and does not install software or ask for secrets. Before using it: (1) ensure you supply the full Shapefile sidecar set (.shp/.shx/.dbf/.prj/.cpg) when asking about a dataset, (2) expect the skill to recommend using your local qgis or other desktop tool for actual file operations (those tools must be present and run by you), and (3) only grant the agent access to local files you trust—the skill itself does not request network exfiltration or credentials, but be cautious when letting any agent read files or upload them elsewhere.Like a lobster shell, security has layers — review code before you run it.
latestvk97a9hejm9rww8cp7n83m4c3j983abcs
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧳 Clawdis
