File Indexer

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is internally consistent with its stated purpose: it indexes metadata in two user directories into a local SQLite DB and does not request extra credentials or network access.

This skill appears coherent and local-only, but check these points before installing: (1) It writes a SQLite DB and creates a .bak under ~/.local/share/file-indexer — if you are uncomfortable with that file, don't install. (2) The allowed roots are ~/Documenti and ~/Scaricati (Italian names) — verify these match the directories you want indexed (e.g., ~/Documents/Downloads). (3) Symlinks inside allowed roots may cause metadata about their targets to be indexed even if those targets live outside the allowed roots; avoid symlinks to sensitive locations. (4) The script does not read file contents or send data over network, but you should still review the included script before running it and run it with your normal least-privilege practices (or in a sandbox) if you have sensitive files. If you want stricter guarantees, change ALLOWED_ROOTS, BLOCKED_DIRS, or run the script manually to inspect behavior before enabling automation.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.