SkillPulse

v1.0.0

Profile offline OpenClaw skill run samples to detect latency, CPU, and memory bottlenecks and compare sessions.

0· 80·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (profile offline samples for latency/CPU/memory) matches the code and SKILL.md. The skill only requires node and works on local JSON samples. No unrelated credentials, binaries, or system config are requested.
Instruction Scope
SKILL.md instructs running the bundled CLI against local JSON sample files and producing JSON/HTML reports. The runtime instructions and source only read the provided input files and write report files; they do not access other system paths, network endpoints, or undeclared environment variables.
Install Mechanism
No install spec is provided (instruction-only with code files). Files are included in the package; there is no external download, no third‑party install script, and package.json has no runtime dependencies, so nothing is pulled from remote at install time.
Credentials
The skill declares no required env vars or credentials and the source code does not read environment secrets. It only relies on the 'node' binary and user-supplied file paths, which is proportionate to the stated functionality.
Persistence & Privilege
always is false and the skill does not attempt to modify other skills or system-wide agent settings. It writes report files to paths specified by the user (expected behavior for a CLI).
Assessment
This skill appears to be a simple, local Node.js CLI for analyzing JSON sample logs. Before installing or using it: (1) ensure you have Node.js >=18; (2) only run it on sample files you trust or have sanitized — the tool will read any JSON file path you provide and could include sensitive data in generated reports; (3) review or run the included tests (test.js) in an isolated environment if you plan to run it in CI; and (4) because it writes files to user-specified paths, avoid supplying output locations that would overwrite important files. There are no network calls or secret accesses in the code, so the risk of remote exfiltration appears low based on the provided source.

Like a lobster shell, security has layers — review code before you run it.

analysisvk97as7e08bbhrrx88zkghnyfqn83pn8qbenchmarkvk97as7e08bbhrrx88zkghnyfqn83pn8qlatestvk97as7e08bbhrrx88zkghnyfqn83pn8qopenclawvk97as7e08bbhrrx88zkghnyfqn83pn8qperformancevk97as7e08bbhrrx88zkghnyfqn83pn8qprofilervk97as7e08bbhrrx88zkghnyfqn83pn8q

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📈 Clawdis
Binsnode

Comments