Log Analyzer
v1.0.0Read a log file, extract ERROR/WARN/CRITICAL lines, group similar messages, and produce a concise summary report. Use when analyzing application logs, agent...
⭐ 0· 123·0 current·0 all-time
by@neo1307
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, SKILL.md, and index.js all align: the code reads an input log, extracts severity lines, groups similar messages, and writes a report. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md instructs running index.js with an --input path. The runtime code will read whatever file path the user supplies (and will write a report to the working directory by default). This is expected for a log analyzer, but the user should avoid pointing it at sensitive system files.
Install Mechanism
No install spec — instruction-only skill with a small included Node.js script. Nothing is downloaded or installed by the skill itself.
Credentials
The skill requests no environment variables or credentials and does not read other config paths. Its access to the filesystem is limited to the user-specified input path and a user-writable output path.
Persistence & Privilege
always:false and normal invocation. The script writes a report file (default ./out/log_analysis_report.md) and prints a small JSON result to stdout — no attempt to persist beyond that or modify other skills/settings.
Assessment
This tool appears coherent and contains no hidden network or credential access. Before running, confirm the input path points only to logs you want analyzed (do not point it at sensitive system files like /etc/shadow, SSH keys, or other secrets). The script writes a Markdown file (default ./out/log_analysis_report.md) in the current working directory. Run it in a controlled environment if you are unsure, and inspect the generated report and console output. If you need stricter isolation, run it inside a container or VM.Like a lobster shell, security has layers — review code before you run it.
latestvk97bkpyzz7rygtxj73nkeb5han838ppw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
