EDID Parser
v1.0.1Parse and analyze EDID (Extended Display Identification Data) from monitors and displays. USE WHEN: (1) User wants to read/parse display EDID information; (2...
⭐ 1· 55·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill is an EDID parser for Linux and its scripts operate on /sys/class/drm and EDID files, which is appropriate. Minor mismatch: SKILL.md and docs claim support for binary .bin files, but batch_validate.py explicitly skips .bin files when scanning directories (it still can process .bin if given directly to other scripts). This looks like a small implementation inconsistency rather than malicious behavior.
Instruction Scope
Runtime instructions and scripts only read local EDID files and run the local edid-decode binary; they do not make network calls or require secrets. One documentation snippet (references/edid_spec.md) shows 'echo 1 > /sys/class/drm/card0-HDMI-A-1/edid' to force a re-read — that writes to sysfs and requires elevated privileges and can affect kernel/device state. That write operation appears only in a reference doc, not in the primary Quick Start scripts, so treat it as an advisory example rather than an automated action.
Install Mechanism
No install spec is provided and scripts are local files. The only external dependency is the standard edid-decode utility (documented). No downloads, external packages, or unusual installers are used.
Credentials
The skill requests no environment variables or credentials. It accesses system paths under /sys/class/drm and user-supplied file paths, which is proportional to parsing EDID data.
Persistence & Privilege
always is false and the skill does not request persistent system-wide configuration or modify other skills. Scripts operate on files provided or discovered at runtime and do not install background services.
Assessment
This skill appears coherent for parsing EDID on Linux. Before using it: (1) install edid-decode (sudo apt-get install edid-decode); (2) run the scripts locally — they only read files under /sys/class/drm or files you point them to; (3) avoid running commands that write to sysfs (e.g., echo > /sys/class/drm/...) unless you understand the effect and have appropriate privileges; (4) note the minor inconsistency where batch_validate.py skips .bin files when scanning directories (you can still pass .bin files directly to other scripts); (5) inspect scripts if you will run them with elevated privileges. Overall the skill is internally consistent with its stated purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk978dgp9nf65prz3qm9xafsw0d84djj4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
