L
v1.0.0Short alias skill for listing files, directories, processes, or system information. Use when you need to see what's present in a directory or system state.
⭐ 0· 198·0 current·0 all-time
byopenlang@openlang-cn
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (list files, processes, system info) align with the SKILL.md: all provided commands (ls, ps, ss, lsof, tree, etc.) are directly relevant and no unrelated credentials, binaries, or installs are requested.
Instruction Scope
Instructions include commands that reveal potentially sensitive system state (printenv/env, ps aux, lsof, firewall rules, kernel modules). This is consistent with a system-listing tool but does mean the agent may surface environment variables and other sensitive details when invoked.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk or fetched during install.
Credentials
The skill declares no required environment variables or credentials (proportionate). However, some suggested commands deliberately read environment variables and system state, so runtime output may include secrets if present in the environment.
Persistence & Privilege
always is false and the skill does not request permanent presence or modify other skills/system settings. Agent autonomous invocation is allowed (platform default) but not unusually privileged here.
Assessment
This skill is coherent with its description and just documents common shell commands to list files, processes, ports, and system state. Before using it, remember: these commands can expose sensitive data (environment variables, process details, open ports, firewall rules). Only invoke this skill in environments where you trust the agent and avoid running it on systems containing secrets you don't want displayed. If you want to limit exposure, run the commands yourself or restrict the agent's permissions (non-root account, limited container) so outputs are less likely to include sensitive items.Like a lobster shell, security has layers — review code before you run it.
latestvk97ey7rfr9q0jrtdxvma2pxdj182ry8j
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
