Bitaxe Skills
v1.0.0Discover, inspect, and manage solo miners on the same local network, with support for Bitaxe and Nerd or NerdAxe devices. Use when Codex or OpenClaw needs to...
⭐ 0· 231·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (discover and manage local miners) match the included code and SKILL.md: the script probes local private IP ranges, GETs /api/system/info, PATCHes /api/system, and POSTs /api/system/restart. No unrelated credentials, external services, or unexpected binaries are required.
Instruction Scope
SKILL.md directs local network discovery and both read and write actions (including restarts). This is within scope but inherently intrusive: discovery scans many LAN addresses and write operations can change device configuration. The SKILL.md and script include safety guidance (allowlist, inspect payload before unknown writes), which reduces concern but users should expect network scanning noise and potential device reboots when using write commands.
Install Mechanism
No install spec is provided (instruction-only skill), and the repository only bundles a Python script that uses the standard library. There are no downloads from arbitrary URLs, no archive extraction, and no package manager installs declared in the registry metadata.
Credentials
The skill requests no environment variables, no credentials, and no config paths. All network access is to local targets derived from host interfaces or explicit user-supplied targets, which is proportionate to the stated functionality.
Persistence & Privilege
always is false and the skill does not request elevated platform privileges. It does not modify other skills or system-wide agent settings. Autonomous invocation is permitted (platform default) but not combined with broader red flags.
Assessment
This skill appears to do what it says: discover miners on your LAN and read or update their /api/system endpoints. Before installing or running it, consider: (1) only run it on networks and devices you control — discovery scans many IPs and write commands can reboot or reconfigure miners; (2) prefer read-only commands first (discover, show) to verify devices; (3) review the bundled scripts yourself (they are included) if you have concerns; (4) the README suggests installing via npx from a GitHub repo — if you follow that route, verify the repository/source identity before fetching; (5) if you need greater assurance, ask the publisher for a canonical homepage or repo to verify maintenance and provenance.Like a lobster shell, security has layers — review code before you run it.
latestvk97fmzypns7ttkv5r67dwtqfjx82pbez
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
