Digital Forensics Tools

v1.0.0

Professional digital forensics tools assessment platform that generates personalized tool recommendations and skill development guidance.

0· 62·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (digital forensics assessment) matches the provided artifacts: SKILL.md describes API endpoints and sample requests/responses. The skill does not request unrelated binaries, credentials, or system access.
Instruction Scope
SKILL.md only documents endpoints, sample payloads, and expected responses; it does not instruct the agent to read local files, environment variables, or send data to unexpected endpoints. Note: the SKILL.md/openapi.json lack any authentication description and some response schemas are empty—this is a functional/provenance gap (not an explicit security action) and means the API description is incomplete.
Install Mechanism
No install specification or code to write to disk (instruction-only). This minimizes install-time risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for a read-only recommendation/assessment API description.
Persistence & Privilege
always is false and the skill does not request persistent system privileges or modify other skills' configurations. Autonomous invocation is allowed by default but not combined with any broad access in this skill.
Assessment
This skill appears internally consistent, but exercise normal caution: verify the skill's provenance (owner/source) before trusting assessments; avoid submitting sensitive or PII data to an undocumented API; test with non-sensitive sample data first; prefer skills with a public homepage or repository and clear authentication/privacy information. If you need this for production use, request the vendor's documentation, authentication details, and a privacy policy to confirm safe handling of any uploaded profile data.

Like a lobster shell, security has layers — review code before you run it.

latestvk973nka5g99em3gmrek8sb5gt183vgky

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments