Sizeup

v1.0.0

Disk usage analyzer with tree view, large file finder, and extension breakdown. Like `du` but actually readable. Pure Python, zero dependencies.

0· 55·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (disk usage analyzer) match the actual files and behavior: the included Python scripts scan directories, calculate sizes, list largest files, and produce JSON or a colored tree. No unrelated credentials, binaries, or network access are requested.
Instruction Scope
SKILL.md usage examples align with the code. Runtime instructions and code only read filesystem metadata and file sizes under the supplied path; they do not read arbitrary environment variables, contact external services, or attempt to modify system-wide settings.
Install Mechanism
No install/download steps are declared and no external packages are fetched. The skill is provided as source files (two copies of the same script) and runs as a local Python program — low install risk.
Credentials
The skill requires no environment variables, credentials, or config paths. All filesystem access is limited to the path argument provided at runtime; there are no requests for unrelated secrets or service tokens.
Persistence & Privilege
always is false and the skill does not attempt to persist configuration or modify other skills. It is user-invocable and may be invoked by the agent (normal platform behavior) but it has no elevated persistence or cross-skill configuration effects.
Assessment
This skill appears to be what it claims — a local disk-usage tool. Before running, note that it will traverse and read file sizes for every file under the path you give (it skips symlinks). Avoid running it as root on '/' unless you intend a full-system scan (it can be slow and will touch many files). The output includes file paths, so do not paste results into untrusted services if they might contain sensitive paths or filenames. If you want extra assurance, inspect the shipped sizeup.py yourself (it's plain, readable Python) — there is no network I/O or hidden behavior observed.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e2c45h35087hh2k6pkqq2xs83q9pd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments