Swagger V2 Retrofit Generator

v0.1.0

Generate Android Retrofit/Kotlin client code from Swagger v2 (OpenAPI 2.0) API documentation. Supports fetching Swagger docs via HTTP with no auth, Basic Aut...

0· 189·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description align with included scripts and reference docs. The two Python scripts implement fetching a Swagger v2 JSON (with optional auth) and generating Kotlin Retrofit code, which is exactly what the skill claims to do.
Instruction Scope
SKILL.md instructs running fetch_swagger.py and generate_retrofit.py (or piping them). The runtime instructions only reference the supplied URL, credentials passed as CLI args, input/output files or stdin/stdout and generation options — no unrelated files, system paths, or external endpoints are accessed beyond the user-provided Swagger URL.
Install Mechanism
There is no install spec; this is instruction + bundled scripts. No external downloads or package installs are performed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths and the code uses only CLI arguments for auth. No unrelated secrets or environment access is requested.
Persistence & Privilege
always:false (default) and the skill does not attempt to modify other skills or system-wide agent settings. It does not request permanent presence or elevated privileges.
Assessment
This skill appears internally consistent and implements exactly what it says: fetching a Swagger v2 JSON (from the URL you provide) and generating Retrofit/Kotlin code. Before running, consider: (1) only supply URLs and credentials for services you trust — the fetch script will make HTTP requests to whatever URL you pass; (2) avoid passing sensitive credentials on the command line on multi-user systems (they can be visible in process listings); prefer piping from a secure local file if possible; (3) review generated code for naming/sanitization edge cases (the generator maps Chinese terms and replaces characters, which can produce unexpected class names); and (4) restrict write destinations (output file paths) to locations you control. Other than these normal operational cautions, there are no unexplained or disproportionate behaviors in the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f7e4k80b3h7cecj6kdv1g9182ns0h

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments