Context Doctor

v1.2.0

Visualize and diagnose OpenClaw context window usage. Generates a terminal-rendered breakdown showing workspace files (status, chars, tokens), installed skil...

0· 1.1k·24 current·26 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (context window diagnosis) aligns with what the code does: scans a workspace, reads bootstrap files, enumerates SKILL.md files, estimates token usage, and optionally renders a PNG. No unrelated resources (cloud credentials, unrelated OS services) are requested.
Instruction Scope
SKILL.md instructs running the included Python script which performs only local discovery and rendering. The script reads files under the workspace, inspects installed-skill directories, and calls local 'openclaw' for version/config. It does not instruct reading unrelated user files, nor does it post data to remote endpoints.
Install Mechanism
No install spec is present (instruction-only with a bundled script). Image export requires optional packages (rich and either rsvg-convert or cairosvg) as documented; these are standard local dependencies and there are no downloads from untrusted URLs.
Credentials
The skill requires no environment variables or credentials. The script optionally respects OPENCLAW_WORKSPACE and invokes 'openclaw' CLI if present — this is reasonable and proportional to discovering workspace location and version.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or system configuration, and does not persist credentials. It only runs when invoked and prints/writes local output (PNG path) as instructed.
Assessment
This skill appears to do exactly what it says: it scans your OpenClaw workspace and skill directories, calls the local 'openclaw' CLI if available, and renders a local visualization. Before installing/running, consider: (1) it will read any files in your OpenClaw workspace and any SKILL.md under scanned skill dirs—avoid running it if those directories contain secrets you don't want inspected; (2) PNG export requires installing 'rich' and either 'cairosvg' or a system 'rsvg-convert' binary; (3) if you are cautious, review the bundled script and run it in a contained environment (or on a copy of the workspace) to confirm behaviour. Overall, nothing in the files indicates network exfiltration or unrelated privilege access.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b3gnedsmy25836b76sevd3s82g0t5

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments