Disk Guardian

v1.0.0

Run S.M.A.R.T. diagnostics on all drives, parse health indicators, maintain a history log, and flag drives showing early failure patterns. Generates health s...

0· 50·0 current·0 all-time
byNew Age Investments@newageinvestments25-byte
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included scripts: scan_drives.py runs smartctl, parse_smart.py parses outputs, report.py generates markdown, and history.py records trends. No extraneous credentials, unrelated binaries, or surprising capabilities are requested.
Instruction Scope
SKILL.md instructions stay on scope: detect drives, run smartctl, parse results, generate reports, and optionally record history under ~/.openclaw/workspace/disk-guardian. The scripts may require sudo for smartctl on Linux and expect python3 on PATH (python requirement is implied but not explicitly listed). No instructions to read unrelated system files or transmit data externally.
Install Mechanism
No install spec; this is an instruction + script bundle. The only external prerequisite is smartctl (smartmontools) which the README documents; the skill does not download/extract code from external URLs or install packages automatically.
Credentials
The skill requests no environment variables or external credentials. It writes and reads a history file under the user's home (~/.openclaw/workspace/disk-guardian) which is proportional to its stated purpose. It may suggest adding a user to a 'disk' group or using sudo for permissions — expected for disk access.
Persistence & Privilege
always:false and normal autonomous invocation defaults. The skill stores history only in its own data directory under the user's home and does not modify other skills or system-wide agent settings.
Assessment
This skill appears to do what it says: local S.M.A.R.T. scans, parsing, reporting, and a local history. Before installing/running: 1) Ensure you have python3 and smartctl (smartmontools) installed; the scripts run smartctl and may need sudo on Linux. 2) The scripts will probe block devices and write history to ~/.openclaw/workspace/disk-guardian (use --data-dir to change); review or run the code manually if you want to inspect behavior first. 3) Running with --sudo will run smartctl as root — only do this if you trust the code; consider running a single scan and reviewing the parsed JSON before recording history. 4) If you have privacy concerns, inspect history.json contents (it stores model/serial, temperatures, flags, timestamps) and choose an alternate data-dir or remove history after use.

Like a lobster shell, security has layers — review code before you run it.

latestvk973d0p0k6msjz41jhbb26szpx83wwpb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments