Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Attendance Sheet
v1.0.0Generate professional attendance sheets in xlsx format from employee work information. Perfect for HR, team management, and daily attendance tracking.
⭐ 0· 1.1k·2 current·2 all-time
by@gykdly
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (generate xlsx attendance sheets) aligns with the provided SKILL.md and the included Python script which builds an .xlsx using openpyxl. There are no unrelated credentials, binaries, or config paths requested.
Instruction Scope
SKILL.md asks for employee/date/attendance input and the script consumes command-line args or a JSON payload and writes a single .xlsx file. The instructions do not direct the agent to read unrelated files, environment variables, or transmit data externally.
Install Mechanism
There is no install spec (lowest-risk), but the script depends on the openpyxl Python package which is not declared in metadata—users will need Python and openpyxl available. No downloads or external installers are invoked by the skill itself.
Credentials
The skill declares no environment variables or credentials and the code does not access os.environ or other secrets. Requested environment access is proportionate (none).
Persistence & Privilege
The skill is not marked always:true and does not modify other skills or system-wide settings. It only writes the output .xlsx file supplied by the user.
Assessment
This skill appears coherent and low-risk: it simply generates XLSX attendance sheets. Before running, ensure you have Python and the openpyxl package installed (e.g., pip install openpyxl) and run the script in a sandbox or virtualenv if the source is unfamiliar. Review the script if you need behavior not present (for example, the code sets up color mappings but does not populate status cells automatically — you must fill cells or extend the script). Also be mindful of the output filename to avoid unintentionally overwriting important files. If you require dependency declarations or assurance about provenance, request a source/homepage or a requirements.txt from the publisher.Like a lobster shell, security has layers — review code before you run it.
latestvk970j8m4ne2nnfz4wek92ybjx580y4d2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
