Virus Monitor
v0.1.1Virus-Monitoring für Wien (Abwasser + Sentinel)
⭐ 1· 1.8k·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (Austrian wastewater + sentinel data for Vienna) align with the SKILL.md content. Declared dependencies (curl, jq, standard Unix tools) are appropriate for fetching/parsing remote JSON/HTML data.
Instruction Scope
SKILL.md provides usage examples and lists sources but is high-level and does not include exact fetch URLs or scraping commands. It does not instruct reading local files or environment secrets. The lack of concrete endpoints means implementation would need to scrape or call public dashboards (may be brittle) but this is within scope for the stated purpose.
Install Mechanism
No install spec and no code files — instruction-only surface is low-risk. No remote downloads or package installs are specified.
Credentials
No environment variables, credentials, or config paths are requested. The skill does not ask for unrelated secrets or elevated access.
Persistence & Privilege
Skill is not always-enabled, and uses default autonomous invocation behavior (normal). It does not request persistent system changes or cross-skill configuration.
Assessment
This skill appears internally consistent and minimal-risk, but take these practical steps before installing:
- Prefer skills with a known source or homepage; this one has unknown origin which lowers provenance confidence.
- Confirm which exact URLs/endpoints the implementation will call (public dashboards vs. scrape) so you know what data is fetched and how often.
- Ensure curl/jq and other tools are installed from trusted system package managers (avoid running untrusted binaries).
- If you allow autonomous invocation, consider restricting network access or running the first few invocations manually to review output and rate/format behavior.
- If you need stronger assurance, ask the publisher for the implementation (script/commands) or run the equivalent commands in a sandboxed environment first.Like a lobster shell, security has layers — review code before you run it.
latestvk97az8cy6tpvh6xzm46ad48bm57yv5sv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
