detect opened proxy

v1.0.0

Detects active system proxy settings on Windows and macOS, tests proxy availability, and returns results in JSON format.

0· 220·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description claim to detect system proxy settings and test availability; the Python script queries Windows registry (reg) and macOS networksetup, falls back to common proxy addresses, and attempts TCP connections to test proxies — all consistent with the stated purpose.
Instruction Scope
SKILL.md directs running the included script and expects JSON output; the script does exactly that. Note: at runtime it will execute system commands (reg, networksetup) and open TCP connections to detected proxy hosts and to several common local ports — this is expected for availability testing but does cause outgoing connection attempts to whatever proxy host/port is configured.
Install Mechanism
Instruction-only skill with no install spec. No code is downloaded from external URLs and the bundled script is included in the package.
Credentials
The skill requests no environment variables, no credentials, and no config paths. The system queries it performs (registry and networksetup) are proportional to proxy detection.
Persistence & Privilege
The skill is not always-enabled, doesn't request elevated privileges or modify other skills/system configuration, and only runs when invoked.
Assessment
This skill appears coherent with its stated purpose. Before running: review the included script (already bundled) if you want assurance, and be aware it will (a) run OS commands: reg (Windows) or networksetup (macOS), and (b) open short TCP connections to any detected proxy host/port and to a list of common local proxy ports (e.g., 127.0.0.1:7890, 8080, etc.). If you are concerned about network probes, run it in a restricted environment or while disconnected from untrusted networks. No credentials or external endpoints are used by the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk9703zrdc505651dqvhp6gj59h82cxrk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments