Input Validator
v1.0.0温和的输入验证器,检测网页/文件/消息中的恶意内容。支持危险内容阻止和可疑内容警告,不影响正常使用。
⭐ 0· 323·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included Python script and SKILL.md. The only required binary is python3 and the code implements pattern-based detection for dangerous/suspicious text, which aligns with the stated purpose.
Instruction Scope
Runtime instructions and integration examples stay within input validation (call validate_input on fetched/uploaded content). One SKILL.md snippet suggests adding self-reflection grep commands that read /var/log (optional telemetry lines); that touches system logs and is outside pure validation, so treat those parts as optional and review before enabling them.
Install Mechanism
No install spec (instruction-only) and only a small Python script is included. Nothing is downloaded or extracted from remote URLs; low install risk.
Credentials
No environment variables, credentials, or config paths are requested. The script's detection patterns include strings that look like credential requests (e.g., 'api.*key') but those are detection patterns, not requirements. Overall credential access is proportionate.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges or modify other skills. It does suggest optional integration snippets, but nothing forces persistent presence.
Scan Findings in Context
[prompt-injection-ignore-previous-instructions] expected: The SKILL.md and testcases intentionally include prompt-injection strings (e.g., 'ignore all previous instructions') because the skill detects such patterns. The pre-scan flag is expected and appropriate for this validator.
Assessment
This skill is internally consistent and low-risk: it runs a local Python script that scans text with regexes and requires no credentials. Before installing, you may want to: (1) review or tune the regex lists — they may be over- or under-inclusive for your use case; (2) avoid enabling the optional 'self-reflection' grep lines that read /var/log if you do not want the agent reading system logs; and (3) remember this is a heuristic filter (not a sandbox) — it can warn/block obvious patterns but is not a substitute for sandboxing or human review of potentially dangerous content.Like a lobster shell, security has layers — review code before you run it.
latestvk97bjpat3c1ecxyktemknt0fy1821bg6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🛡️ Clawdis
Binspython3
