Hash Toolkit
v1.0.0Content hashing for deduplication with MD5, SHA256, and perceptual hashing
⭐ 0· 580·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (content hashing, MD5/SHA256, perceptual hashing) match the SKILL.md content. The examples and exported functions implement hashing and duplicate checks; no unrelated binaries, env vars, or external services are requested.
Instruction Scope
All instructions and code are local and self-contained. However, the perceptual hash is a placeholder (lowercasing and hashing) and will not produce meaningful image perceptual hashes; calculateHashSimilarity compares hex-character equality rather than bitwise Hamming distance. generateMultipleHashes includes weaker algorithms (md5, sha1) and truncates sha512 to 32 hex chars, which may mislead users about strength.
Install Mechanism
Instruction-only skill with no install spec and no external downloads. No code is written to disk by an installer. Low installation risk.
Credentials
No environment variables, credentials, or config paths are requested. The required surface is proportional to the stated purpose.
Persistence & Privilege
Does not request always-on inclusion, does not modify other skills or system settings. Normal agent-invocation defaults apply.
Assessment
This skill appears to do what it says: local hashing and simple deduplication helpers. It does not request credentials or install software. Before using in production, note these caveats: MD5 and SHA-1 are cryptographically weak — avoid them for security-sensitive integrity or auth; the sha512 result is truncated which reduces entropy and could cause more collisions; the perceptual-hash implementation is only a placeholder and is not suitable for image-similarity detection — use a dedicated pHash/dHash/aHash library; similarity comparison operates on hex characters rather than bit-level Hamming distance. If you need cryptographic guarantees or reliable perceptual matching, replace the placeholder methods with vetted libraries and test on representative data.Like a lobster shell, security has layers — review code before you run it.
latestvk975vvtjvv15q8z5y8s3hc8z6h81hmc4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
