Code Patent Scanner

v1.4.0

Scan your codebase for distinctive patterns — get structured scoring and evidence for patent consultation. NOT legal advice.

13· 2.6k·9 current·10 all-time
byLee Brown@leegitw
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (codebase patent-pattern scanning) align with instructions: the SKILL.md describes local repository discovery, prioritization, pattern analysis, and claim-angle drafting. It requires no binaries, env vars, or installs, which is proportionate for a pure-analysis skill.
Instruction Scope
The runtime instructions explicitly operate on a provided path or current directory and enumerate file types/dirs to include/exclude (expected). The SKILL.md also asserts "This skill operates locally. It does not transmit code or analysis results to any external service." That is a behavioral promise in the instructions (not an enforceable technical constraint) — the instructions themselves do not direct any external network calls or access to unrelated system files.
Install Mechanism
No install spec and no code files are present. Being instruction-only is low-risk and consistent with a static analysis helper.
Credentials
The skill declares no required environment variables, credentials, or config paths. That matches the stated local analysis purpose and is appropriately minimal.
Persistence & Privilege
always is false and the skill does not request persistent presence or elevated privileges. disable-model-invocation is default (allows autonomous invocation), which is normal; there are no other privilege escalations requested.
Assessment
This skill appears internally coherent and is designed to run locally against a repository. Before installing or using it: 1) Confirm the agent runtime environment will not automatically transmit files or outputs to external services — the SKILL.md promises local-only operation but cannot enforce platform-level network behavior. 2) Avoid running the skill on sensitive/proprietary code unless you trust the agent runtime and logs; review any outputs it generates before sharing. 3) Remember the tool is explicitly non-legal and intended to surface technical patterns; consult a qualified patent attorney before taking IP-related actions. If you need stronger guarantees about data staying on your machine, run analysis in an isolated/offline environment or inspect agent/network policies first.

Like a lobster shell, security has layers — review code before you run it.

ai-analysisvk97dvettvcbetkj19dvy2qzms181pw7vbrainstormingvk97dvettvcbetkj19dvy2qzms181pw7vcode-analysisvk97dvettvcbetkj19dvy2qzms181pw7videationvk97dvettvcbetkj19dvy2qzms181pw7vinnovationvk97dvettvcbetkj19dvy2qzms181pw7vintellectual-propertyvk97dvettvcbetkj19dvy2qzms181pw7vinventionvk97dvettvcbetkj19dvy2qzms181pw7vlatestvk97dvettvcbetkj19dvy2qzms181pw7vopenclawvk97dvettvcbetkj19dvy2qzms181pw7vpatentvk97dvettvcbetkj19dvy2qzms181pw7vpatentabilityvk97dvettvcbetkj19dvy2qzms181pw7vpatentsvk97dvettvcbetkj19dvy2qzms181pw7v

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments