PDF Report
v1.0.1Generate clean A4 PDF reports from structured JSON using Jinja2 and WeasyPrint. Use when the user needs a formatted PDF document — analytical summary, data r...
⭐ 0· 116·0 current·0 all-time
byUmbra@mohamed-hammane
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (PDF from JSON using Jinja2/WeasyPrint) matches the included script, template, and the single required binary (python3). There are no unrelated credentials, system paths, or binaries requested.
Instruction Scope
Runtime instructions and the script stay focused on reading JSON and rendering a local template to PDF. The code enforces that input/output/template paths stay inside the workspace. One operational note: custom templates (raw HTML) can reference external resources (fonts, images, CSS). WeasyPrint may attempt to fetch externally-referenced URLs when rendering, which can result in network requests if a template contains absolute http(s) URLs — SKILL.md does not explicitly forbid external URLs.
Install Mechanism
This is instruction-only (no packaged installer). SKILL.md suggests creating a dedicated venv and installing weasyprint and jinja2 — a reasonable, low-risk approach. System packages for WeasyPrint are listed (apt-get), which is expected for that library.
Credentials
No credentials or sensitive environment variables are requested. The script optionally honors OPENCLAW_WORKSPACE to locate the workspace root; this is proportional to its need to resolve paths.
Persistence & Privilege
The skill is not always-on and does not request elevated or persistent platform privileges. It writes outputs and may create the suggested dedicated venv under the user's home; it does not modify other skills or system-wide agent configuration.
Assessment
This skill appears to do exactly what it says: read JSON and render a formatted A4 PDF using the included Jinja2 template or a user-supplied template. Before installing or running it, consider the following: (1) Installing WeasyPrint system libraries may require sudo/apt access — run in an environment where you control package installs. (2) If you supply custom templates, review them — templates can include absolute http(s) URLs (fonts, images, CSS) and WeasyPrint will fetch those during rendering, which may make outbound network requests. Avoid untrusted templates if you need an air-gapped or privacy-preserving run. (3) The script enforces that input, output, and template paths stay inside the workspace; still run it with non-sensitive data until you’re comfortable. (4) The code respects an OPENCLAW_WORKSPACE env var if present; you can set this explicitly to control where files are read/written.Like a lobster shell, security has layers — review code before you run it.
latestvk971h20s6gtt4zne9b15agmqqd846r2e
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
PDF Clawdis
Binspython3
