Vx Commands
v1.0.0Complete vx CLI command reference. Use when looking up specific vx command syntax, flags, or output formats. All commands support --json for structured outpu...
⭐ 0· 30·1 current·1 all-time
byHal@loonghao
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill is a CLI reference for the 'vx' tool; it neither requires credentials nor declares installs, and all referenced commands and environment variables (e.g., VX_OUTPUT) are relevant to a vx usage guide.
Instruction Scope
SKILL.md only documents vx commands, flags, output formats, and environment variables. It does not instruct the agent to read unrelated files, exfiltrate data, or contact third-party endpoints; commands shown are what a user would expect for a CLI reference.
Install Mechanism
No install spec or downloadable artifacts are present (instruction-only). Nothing is written to disk by the skill bundle itself.
Credentials
The skill does not request any environment variables, secrets, or config paths beyond documenting VX_OUTPUT as an optional user environment variable. No disproportionate credential access is requested.
Persistence & Privilege
The skill is not marked always:true and does not request persistent system privileges. It is user-invocable and can be called by the agent when allowed, which is the normal platform behavior.
Assessment
This SKILL.md is a documentation-only reference for the vx CLI and appears coherent and proportionate. Before running any vx commands shown here, ensure the vx binary you use is from a trusted source (install origins for vx itself matter). Because the skill only documents commands, the primary risk comes from actually executing vx commands on your system (they can install tools, modify files, or access network resources). If you do not have vx installed or do not trust its source, do not run the commands. If you want stricter control, keep this skill user-invocable (not always-enabled) so it runs only when you explicitly call it.Like a lobster shell, security has layers — review code before you run it.
latestvk97eb69fr5h5f34ds316w53vd5849b7v
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
