Claude Usage
v1.0.0Calculate Claude Max subscription usage from OpenClaw session data. Shows credits consumed, weekly budget percentage, 5-hour rate limit window, and per-session breakdown.
⭐ 0· 933·7 current·7 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Claude usage from OpenClaw session data) match the included files: a Python scanner that reads OpenClaw session JSONL files, computes credits using the documented formula, and reports per-session and windowed usage. No extraneous cloud credentials or unrelated dependencies are requested.
Instruction Scope
SKILL.md instructs the user to provide the weekly reset time and plan and then run the bundled Python script. The runtime instructions and script operate on session files under ~/.openclaw/agents/... and save a small config; they do not instruct reading unrelated system files, scanning other home directories, or sending data to external endpoints.
Install Mechanism
There is no install spec in the skill bundle (instruction-only install), which is low risk. The package includes package.json and a small Node wrapper that execs the Python script (normal convenience). README suggests npm installation or ClawHub, but the skill itself does not perform any remote downloads during runtime.
Credentials
The skill declares no required environment variables or credentials. The script reads OpenClaw session files and writes a local config (~/.openclaw/claude-usage.json), which is proportionate to its purpose. It does not request unrelated secrets.
Persistence & Privilege
The script will create and update a small config file in the user's home (~/.openclaw/claude-usage.json) to store reset_time/plan/tz — this is expected behavior for a local CLI tool. The skill is not marked always:true and does not modify other skills or system-wide agent settings.
Assessment
This tool appears to do what it says: it reads local OpenClaw session JSONL files (auto-detected under ~/.openclaw/agents/main/sessions), computes Claude credits, prints reports, and saves a config at ~/.openclaw/claude-usage.json. Before installing/running: (1) Verify you have Python 3.9+ and are comfortable the script will read those session files; (2) inspect the included scripts if you want to confirm there's no network activity (the provided code shows no HTTP/remote calls); (3) be aware session transcripts may contain sensitive content — the tool processes them locally and does not request external credentials. If you want additional assurance, run the Python script in a sandbox or review the full script contents (it is included in the bundle).Like a lobster shell, security has layers — review code before you run it.
latestvk97ajkcehwy6hd7h7rytnfck8x80tqfv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
