Claude Usage Analyzer

v0.2.0

Analyze Claude Code token usage. Shows where tokens went, which projects cost most, and how to reduce waste. Use when user asks about token usage, costs, or...

0· 0·0 current·0 all-time
bySingYee@singggggyee
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (analyze Claude Code token usage) aligns with the declared config path (~/.claude/projects/*/*.jsonl) and the instructions to run the ccwhy CLI to produce reports. No unrelated credentials or system access are requested.
Instruction Scope
Instructions are narrowly scoped to reading local Claude session logs and invoking ccwhy. The SKILL.md states 'offline, no network', but the agent's behavior depends on the external ccwhy binary (which could contact network services); the skill itself does not supply or install ccwhy.
Install Mechanism
Instruction-only skill with no install spec or shipped code — lowest install risk. It requires the user to pre-install the third-party ccwhy CLI (link provided), which is out-of-band and should be reviewed by the user.
Credentials
No environment variables, credentials, or unrelated config paths are requested. Access to ~/.claude/... logs is proportional to the stated purpose, but those logs may contain sensitive content and should be considered private.
Persistence & Privilege
No persistent or elevated privileges requested (always:false, no config writes, no system-wide changes). The skill is user-invocable only and does not autonomously require extra privileges.
Assessment
This skill simply parses your local Claude session logs using the ccwhy CLI. Before installing/using it: (1) confirm you have the exact logs at ~/.claude/projects/*/*.jsonl and are comfortable with them being read; (2) review and install ccwhy from the linked GitHub repo and audit its code or run it in a network-isolated environment if you need assurance it won't phone home; (3) consider redacting sensitive content from logs or backing them up first. If you don't trust the external ccwhy binary, do not run it — the SKILL.md does not bundle or vet that tool.

Like a lobster shell, security has layers — review code before you run it.

latestvk979fr34d10bkbv3cy5p7fj35h844jgn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Claude Usage Analyzer

Analyze your Claude Code token usage by parsing local session logs.

Data access

  • Reads ~/.claude/projects/*/*.jsonl (local Claude Code session logs)
  • Runs offline, no network access, no API keys, no credentials
  • Open source: https://github.com/SingggggYee/ccwhy

Usage

Requires the ccwhy CLI to be pre-installed. See https://github.com/SingggggYee/ccwhy for installation instructions.

ccwhy

More commands:

  • ccwhy report --days 7 (last 7 days)
  • ccwhy sessions (top sessions by cost)
  • ccwhy session <id> (per-turn breakdown)
  • ccwhy --json (machine-readable output)

Files

1 total
Select a file
Select a file to preview.

Comments

Loading comments…