DrugFlow

v1.0.2

Multi-flow API workflow skill for this DrugFlow Django repository. Use when an agent needs executable end-to-end API procedures such as login/register, works...

0· 147·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (end-to-end DrugFlow API flows) matches the included scripts and reference docs. The scripts perform sign-in, workspace/balance/job operations, create jobs, upload datasets and poll results — all expected for this purpose.
Instruction Scope
SKILL.md and the scripts direct the agent to run flow scripts that will read local files (PDB, ligands, smiles files) and send them to the provided base_url. This behavior is coherent with docking/structure/VS flows, but it means the agent will access and transmit local files when asked to run those flows.
Install Mechanism
No install spec; the skill ships Python scripts only. No external installers, downloads, or package installs are requested by the skill metadata.
Credentials
The skill does not request environment variables or platform credentials. It expects runtime parameters (base_url, email, password) passed to scripts — which is appropriate for authenticating to a DrugFlow deployment, but those credentials will be transmitted to whatever base_url is supplied, so the target URL must be trusted.
Persistence & Privilege
always is false and there is no installation hook or config mutation. The skill does network I/O and file I/O when executed but does not request elevated system privileges or persistent autorun.
Assessment
This skill appears to do what it claims: run DrugFlow API flows and upload/submit files to a DrugFlow server. Before installing or invoking it, verify the source (there's no homepage and the owner is unknown), and only point scripts to a trusted base_url. Be aware that running flows will read local PDB/ligand/smiles files and transmit them (and will send supplied email/password) to the configured server — avoid running it against untrusted endpoints or with sensitive files/credentials. If you need higher assurance, review the repository locally (the included Python files are human-readable) and run the scripts in an isolated environment or container.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ffws5kqzcgr1njhpyh3gqyh835wx6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments