Shorten

v1.0.0

Shorten URLs using is.gd (no auth required). Returns a permanent short link.

1· 1.9k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the implementation: shorten.sh performs an HTTP POST to https://is.gd/create.php and returns the result. One small inconsistency: the package/registry metadata lists no required binaries, but the script uses curl — curl is necessary for the skill to work and should be declared.
Instruction Scope
SKILL.md instructs running the provided shorten.sh with a URL. The script only sends the provided URL to is.gd and prints the response; it does not read other files, environment variables, or system configuration.
Install Mechanism
There is no install spec (instruction-only with an included script). Nothing is downloaded or extracted during installation; runtime outbound HTTP to is.gd is expected behavior.
Credentials
The skill requests no credentials or config. It performs a single network call to is.gd, which is proportional to the described purpose. Note that no environment variables are needed or used.
Persistence & Privilege
The skill does not request persistent presence (always:false) and does not modify other skills or system settings. It is user-invocable and may be invoked autonomously by the agent per platform defaults.
Assessment
This skill is small and coherent: it runs a local shell script that POSTs your provided URL to is.gd and returns the short link. Before installing, consider: 1) curl must be available on the host (the metadata does not declare this dependency). 2) The original URL is transmitted to is.gd — do not shorten sensitive or confidential links unless you accept that the target URL is shared with the external service. 3) Because it performs network calls, check your environment's network/policy constraints if you operate in a high-security environment. If these points are acceptable, the skill appears safe for its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk975tm2nz53wynbh8g8rd1q4z57ztje0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments