dateguard

v1.0.1

Date/time anti-pattern scanner -- detects timezone bugs, naive datetime usage, hardcoded timestamps, non-ISO formats, incorrect epoch handling, DST-unsafe co...

0· 91· 2 versions· 0 current· 0 all-time· Updated 11h ago· MIT-0

Install

openclaw skills install dateguard

DateGuard -- Date/Time Anti-Pattern Scanner

DateGuard scans codebases for date/time anti-patterns, timezone bugs, naive datetime usage, hardcoded timestamps, non-ISO formats, incorrect epoch handling, DST-unsafe comparisons, locale-dependent parsing, and temporal storage issues. It uses regex-based pattern matching against 90 date/time-specific patterns across 6 categories, lefthook for git hook integration, and produces markdown reports with actionable remediation guidance. 100% local. Zero telemetry.

Commands

Free Tier (No license required)

dateguard scan [file|directory]

One-shot date/time quality scan of files or directories.

How to execute:

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [target]

What it does:

  1. Accepts a file path or directory (defaults to current directory)
  2. Discovers all source files (skips .git, node_modules, binaries, images, .min.js)
  3. Runs 30 date/time quality patterns against each file (free tier limit)
  4. Calculates a date/time quality score (0-100) per file and overall
  5. Grades: A (90-100), B (80-89), C (70-79), D (60-69), F (<60)
  6. Outputs findings with: file, line number, check ID, severity, description, recommendation
  7. Exit code 0 if score >= 70, exit code 1 if date/time quality is poor
  8. Free tier limited to first 30 patterns (TZ + NF categories)

Example usage scenarios:

  • "Scan my code for timezone issues" -> runs dateguard scan .
  • "Check this file for date anti-patterns" -> runs dateguard scan src/server.ts
  • "Find naive datetime usage" -> runs dateguard scan src/
  • "Audit date/time handling in my project" -> runs dateguard scan .
  • "Check for DST-unsafe date math" -> runs dateguard scan .

Pro Tier ($19/user/month -- requires DATEGUARD_LICENSE_KEY)

dateguard scan --tier pro [file|directory]

Extended scan with 60 patterns covering timezone, formatting, epoch precision, and date arithmetic.

How to execute:

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [target] --tier pro

What it does:

  1. Validates Pro+ license
  2. Runs 60 date/time patterns (TZ, NF, EP, DA categories)
  3. Detects epoch precision bugs (ms vs seconds confusion)
  4. Identifies DST-unsafe date arithmetic
  5. Full category breakdown reporting

dateguard scan --format json [directory]

Generate JSON output for CI/CD integration.

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --format json

dateguard scan --format html [directory]

Generate HTML report for browser viewing.

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --format html

dateguard scan --category EP [directory]

Filter scan to a specific check category (TZ, NF, EP, DA, CP, ST).

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --category EP

Team Tier ($39/user/month -- requires DATEGUARD_LICENSE_KEY with team tier)

dateguard scan --tier team [directory]

Full scan with all 90 patterns across all 6 categories including comparison/parsing and storage/serialization.

How to execute:

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --tier team

What it does:

  1. Validates Team+ license
  2. Runs all 90 patterns across 6 categories
  3. Includes comparison/parsing checks (string date comparison, == on Date objects)
  4. Includes storage/serialization checks (VARCHAR for dates, missing timezone in DB)
  5. Full category breakdown with per-file results

dateguard scan --verbose [directory]

Verbose output showing every matched line and pattern details.

bash "<SKILL_DIR>/scripts/dispatcher.sh" --path [directory] --verbose

dateguard status

Show license and configuration information.

bash "<SKILL_DIR>/scripts/dispatcher.sh" status

Check Categories

DateGuard detects 90 date/time anti-patterns across 6 categories:

CategoryCodePatternsDescriptionSeverity Range
Timezone HandlingTZ15Missing timezone in datetime creation, implicit local timezone, hardcoded offsets, timezone conversion without DST handlingmedium -- high
Naive FormattingNF15Non-ISO date formats in APIs, locale-dependent parsing, ambiguous MM/DD vs DD/MM, toString() on dateslow -- high
Epoch & PrecisionEP15Millisecond vs second confusion, Y2038 risk, timestamps as strings, floating point timestamps, epoch 0 sentinelslow -- medium
Date ArithmeticDA15Manual +86400 day math, month arithmetic ignoring varying lengths, leap year bugs, DST-crossing calculationsmedium -- high
Comparison & ParsingCP15Lexicographic date string comparison, Date == comparison, unparsed user input, timezone-unaware comparisonsmedium -- high
Storage & SerializationST15VARCHAR for timestamps in SQL, missing timezone in stored dates, JSON.stringify on Date, hardcoded date stringslow -- high

Tier-Based Pattern Access

TierPatternsCategories
Free30TZ, NF
Pro60TZ, NF, EP, DA
Team90TZ, NF, EP, DA, CP, ST
Enterprise90TZ, NF, EP, DA, CP, ST + priority support

Scoring

DateGuard uses a deductive scoring system starting at 100 (perfect):

SeverityPoint DeductionDescription
Critical-25 per findingSevere temporal bug (Y2038, data loss from timezone)
High-15 per findingSignificant quality problem (naive datetime, DST math)
Medium-8 per findingModerate concern (ambiguous formats, missing timezone)
Low-3 per findingInformational / best practice suggestion

Grading Scale

GradeScore RangeMeaning
A90-100Excellent date/time handling
B80-89Good handling with minor issues
C70-79Acceptable but needs improvement
D60-69Poor date/time quality
FBelow 60Critical temporal problems
  • Pass threshold: 70 (Grade C or better)
  • Exit code 0 = pass (score >= 70)
  • Exit code 1 = fail (score < 70)

Configuration

Users can configure DateGuard in ~/.openclaw/openclaw.json:

{
  "skills": {
    "entries": {
      "dateguard": {
        "enabled": true,
        "apiKey": "YOUR_LICENSE_KEY_HERE",
        "config": {
          "severityThreshold": "medium",
          "ignorePatterns": ["**/test/**", "**/fixtures/**", "**/*.test.*"],
          "ignoreChecks": [],
          "reportFormat": "text"
        }
      }
    }
  }
}

Important Notes

  • Free tier works immediately with no configuration
  • All scanning happens locally -- no code is sent to external servers
  • License validation is offline -- no phone-home or network calls
  • Pattern matching only -- no AST parsing, no external dependencies beyond bash
  • Supports scanning all file types in a single pass
  • Git hooks use lefthook which must be installed (see install metadata above)
  • Exit codes: 0 = pass (score >= 70), 1 = fail (for CI/CD integration)
  • Output formats: text (default), json, html

Error Handling

  • If lefthook is not installed and user tries hooks, prompt to install it
  • If license key is invalid or expired, show clear message with link to https://dateguard.pages.dev/renew
  • If a file is binary, skip it automatically with no warning
  • If no scannable files found in target, report clean scan with info message
  • If an invalid category is specified with --category, show available categories

When to Use DateGuard

The user might say things like:

  • "Scan my code for timezone issues"
  • "Check my date/time handling"
  • "Find naive datetime usage"
  • "Detect DST-unsafe date math"
  • "Are there any hardcoded timestamps?"
  • "Check for missing timezone handling"
  • "Audit my date/time practices"
  • "Find ambiguous date formats"
  • "Check for epoch precision bugs"
  • "Scan for date/time anti-patterns"
  • "Run a date/time quality audit"
  • "Generate a date/time quality report"
  • "Check if dates are stored properly in my database schema"
  • "Find Date objects compared with == instead of getTime()"
  • "Check my code for Y2038 risks"

Version tags

latestvk97a8a7ssptmg7a4x46v8351rx84v4wr

Runtime requirements

📅 Clawdis
OSmacOS · Linux · Windows
Binsgit, bash, python3, jq
Primary envDATEGUARD_LICENSE_KEY

Install

Install lefthook (git hooks manager)
Bins: lefthook
brew install lefthook