Brew Audit

v1.0.0

Audit Homebrew installation — outdated packages, cleanup opportunities, and health checks. Use when asked about brew updates, system maintenance, or package...

0· 669·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the included script and SKILL.md. The skill only requires the 'brew' binary which is appropriate for a Homebrew audit. Minor mismatch: SKILL.md metadata indicates macOS (darwin) but the registry lists no OS restriction—this should be reconciled but does not affect functionality.
Instruction Scope
SKILL.md and the script instruct only to run brew commands (outdated, cleanup --dry-run, doctor, list, --prefix). The script does not read arbitrary files or environment variables, nor does it post data to external endpoints. Note: Homebrew commands may contact network services as part of normal operation (e.g., checking for newer versions), which is expected behavior.
Install Mechanism
No install spec (instruction-only) and included script is plain shell. Nothing is downloaded or extracted by the skill itself. Risk is low because no external installers or URL-based payloads are used.
Credentials
No environment variables, credentials, or config paths are requested. The script does not access secrets or unrelated system config.
Persistence & Privilege
always:false (no forced inclusion). The skill is user-invocable and allows normal autonomous invocation, which is the platform default. The skill does not modify other skills or system-wide configs.
Assessment
This appears safe and coherent for macOS users with Homebrew installed. Before installing/using: (1) confirm you're on macOS and have 'brew' available, (2) review the included script (it is short and readable), (3) note that running 'brew cleanup' or 'brew upgrade' will change system state—only run those if you intend to update/remove packages, and (4) consider asking the registry owner to set the OS restriction to macOS/darwin to avoid accidental use on unsupported systems.

Like a lobster shell, security has layers — review code before you run it.

latestvk97acr7kajptjbe42wpwq4sr55817rhq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🍺 Clawdis
Binsbrew

Comments