Work Todo - 工作待办管理

v1.0.1

管理工作待办事项,支持添加、查看、完成、删除待办

0· 80·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (work todo manager) matches the included instructions: Python snippets to load, save, add, and update todos stored in a JSON file. No unrelated credentials, binaries, or services are requested.
Instruction Scope
Instructions operate on a single filesystem path (~/.openclaw/workspace/shared/work-todo/lwork/todos.json) and include concrete Python functions for CRUD on that file. This is scoped to the stated purpose, but the skill will read/write a file in your home directory — verify you are comfortable with that storage location and its contents.
Install Mechanism
No install spec and no code files beyond SKILL.md (instruction-only) — nothing is downloaded or written to disk by an installer. Lowest-risk install footprint.
Credentials
No environment variables, credentials, or external config paths are required. The only resource accessed is the declared JSON file path.
Persistence & Privilege
always is false and the skill is user-invocable (normal). It does create/modify a file under the user's home but does not request persistent elevated privileges or modify other skills/configs.
Assessment
This skill appears internally consistent and local-only. Before installing: (1) Review SKILL.md yourself to confirm the file path and behavior are acceptable; it will create and modify ~/.openclaw/workspace/shared/work-todo/lwork/todos.json. (2) If the directory is sensitive, consider changing the storage path or restrict file permissions. (3) Note a minor metadata/version mismatch (SKILL.md shows 1.0.0 while registry lists 1.0.1) — not a security problem but worth checking for updated instructions. (4) If you prefer stricter control, disable autonomous invocation for agents that could call this skill, or monitor the created file for unexpected contents.

Like a lobster shell, security has layers — review code before you run it.

latestvk975sqbq2fh7wp8wkeryqp1p8n84574r

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments