Homelab Assets

v1.0.0

Track and manage homelab hardware inventory with details on purchase, warranty, power use, location, spend, and generate insurance-ready reports.

0· 50·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the code and instructions. All required capabilities (reading/writing a local JSON inventory, generating reports, searching/updating assets) are appropriate for an inventory/asset-tracking skill; no extraneous credentials, binaries, or unrelated capabilities are requested.
Instruction Scope
SKILL.md explicitly confines data to a single inventory JSON (default ~/.openclaw/workspace/homelab-assets/inventory.json, overridable by HOMELAB_ASSETS_PATH) and instructs running the bundled Python scripts. The runtime instructions do not request other system files, network endpoints, or broad contextual data beyond the inventory file.
Install Mechanism
No install spec or external downloads are present. All functionality is provided by the bundled, human-readable Python scripts — nothing will be fetched from the network during install.
Credentials
No secrets or credentials are required. The only environment access is optionally reading HOMELAB_ASSETS_PATH to override the inventory file path, which is reasonable for this purpose.
Persistence & Privilege
The skill is not force-enabled (always:false) and requests no system-wide privileges. It reads and writes a single inventory file under the user's home directory; this is expected for an asset-tracking tool.
Assessment
This skill appears to do what it says: it stores and manages a local JSON inventory using the included Python scripts and does not contact external services or request secrets. Before installing: (1) confirm you are comfortable with the inventory file being created at ~/.openclaw/workspace/homelab-assets/inventory.json (or set HOMELAB_ASSETS_PATH to a different location), (2) back up any existing inventory.json if you have one, (3) verify file permissions on the inventory file to keep sensitive serial numbers/locations private, and (4) ensure python3 is available in the execution environment. If you want extra caution, inspect the included scripts locally (they are plain Python) and run them manually rather than allowing autonomous agent invocation.

Like a lobster shell, security has layers — review code before you run it.

latestvk9742cmpvgjvanv7b8j8dx968183wmpq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments