Security Passwords
v1.0.0Provides curated top password lists for authorized security testing, including common, leaked, and worst passwords under 10MB.
⭐ 0· 99·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (curated password lists for authorized testing) matches the included files and example usage. The bundled lists and README links to SecLists/MIT are appropriate for the stated purpose.
Instruction Scope
SKILL.md only instructs the agent to read files packaged in references/Passwords and to use them for authorized testing; it does not request unrelated files, system paths, environment variables, or network exfiltration.
Install Mechanism
No install specification or external downloads are present — this is instruction-only with static text assets included in the bundle, which minimizes install-time risk.
Credentials
The skill requires no environment variables, no credentials, and no config paths. All required data is local to the skill and proportionate to the password-list purpose.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent elevated privileges or modify other skills or system-wide agent settings.
Assessment
This skill appears coherent and low-risk in structure, but the included password lists contain leaked, offensive, and highly sensitive entries — they can be abused. Only use these lists for authorized testing (with written permission), bug bounties in-scope, CTFs, or education. Keep the files and any results on trusted systems, do not upload them to third-party services without consent, and verify you have legal authorization before performing any credential-stuffing or brute-force testing. Review the MIT license and attribution if you redistribute the lists.Like a lobster shell, security has layers — review code before you run it.
latestvk978cn5prefax7pfvr2cakhjgd83a8ym
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
