Office Automation (Alex)

v1.0.0

自动化处理 Word 和 Excel 文件。使用 Python 脚本读取、写入、格式化文档和表格。支持批量处理、模板填充、数据提取和格式转换。

0· 38·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Requires OAuth token
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Word/Excel automation) match the included scripts and docs. Required binary (python3) and Python packages (python-docx, openpyxl, pandas) are appropriate and expected.
Instruction Scope
SKILL.md and README instruct running the included scripts and installing dependencies; that matches the skill. Documentation also contains optional GitHub push/setup instructions (including creating Personal Access Tokens with repo scope) — these are not required to use the skill and are only documentation, but users should be cautious when following them.
Install Mechanism
No automated download-from-URL or obscure install step is present. The skill is instruction-first and recommends pip installs of well-known packages. That is proportionate for Python scripts.
Credentials
The skill does not request environment variables, external credentials, or config paths. All file access is limited to user-supplied document paths and example data in the repo.
Persistence & Privilege
always is false and the skill does not request system-wide or cross-skill configuration changes. It does not attempt to persist credentials or modify other skills.
Assessment
This skill appears to do what it says: run the included Python scripts to process .docx/.xlsx files. Before installing/using it: (1) run in a virtualenv to isolate pip installs; (2) inspect templates/data you feed it (avoid processing sensitive production files without backups); (3) treat the GitHub push instructions as optional — do not paste a GitHub Personal Access Token into unknown tools or share it; create tokens with minimal scopes and short expirations if you must; (4) run scripts on copies of files first and review outputs; (5) if you need higher assurance, review the three scripts (word_processor.py, excel_processor.py, batch_processor.py) yourself — they contain only local file operations and no network calls.

Like a lobster shell, security has layers — review code before you run it.

automationvk9790s6t21gt6fz1zqftt3vksn84jpzwexcelvk9790s6t21gt6fz1zqftt3vksn84jpzwlatestvk9790s6t21gt6fz1zqftt3vksn84jpzwofficevk9790s6t21gt6fz1zqftt3vksn84jpzwpythonvk9790s6t21gt6fz1zqftt3vksn84jpzwwordvk9790s6t21gt6fz1zqftt3vksn84jpzw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📊 Clawdis
Binspython3

Comments