BirdWeather PUC

v1.0.0

Access BirdWeather PUC station data — species detections, sensor readings (AQI, temperature, humidity, pressure, eCO₂, sound dB), and historical trends. Use...

0· 41·0 current·0 all-time
byPaul Frederiksen@pfrederiksen
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (BirdWeather PUC data access) aligns with required actions: HTTP GETs to app.birdweather.com and optional local SQLite logging. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md instructs only to fetch station endpoints, run the included Python script, and optionally write to a user-specified DB. It does not instruct reading other system files, secrets, or sending data to third-party endpoints.
Install Mechanism
Instruction-only skill with one included Python script; there is no install spec or external downloads. Uses standard library urllib and sqlite3 — no additional packages or remote installers.
Credentials
No required environment variables or credentials are declared. The SKILL.md suggests an optional public station token (read-only) which is consistent with the API docs; no unrelated secrets or multiple credentials are requested.
Persistence & Privilege
Skill is not always-enabled and does not request system-wide persistence. It only writes to an explicit DB path provided by the user (no hidden persistence or modifications to other skills).
Assessment
This skill appears to do exactly what it claims: read public BirdWeather station endpoints and optionally log data to a local SQLite DB. Before installing, ensure you: 1) pass a DB path you control (don't write to shared/system locations), 2) understand that storing logs locally will retain detection and sensor history, and 3) review the included script if you require extra assurance — it uses only standard Python libs and contacts app.birdweather.com. If you plan to enable autonomous invocation, be aware the agent could poll the station or update the DB without interactive approval (the skill itself does not request broad credentials).

Like a lobster shell, security has layers — review code before you run it.

latestvk97f9kwd7gm1nmbcd473fgcj1x843518

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments