Dupfile Finder
v1.0.0Identify and list duplicate files in a specified directory to help manage and free up storage space efficiently.
⭐ 0· 0·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The tool walks a directory, computes SHA-256 checksums, and reports files with identical hashes — exactly what a duplicate-file finder should do. There are no unexpected dependencies or credentials requested.
Instruction Scope
SKILL.md instructs running 'python dupfile_finder.py' but the bundled script is named tool.py; this mismatch could confuse users. The instructions otherwise stay within the stated purpose and do not ask the agent to read unrelated system state or transmit data externally. The SKILL.md also includes a 'Price' line ($1.50) which is informational but not part of runtime behavior.
Install Mechanism
No install spec is provided; the skill is instruction + local Python script only. Nothing is downloaded or written to disk during install.
Credentials
The skill requests no environment variables, credentials, or config paths. The code operates on the directory the user supplies, which is proportional to its purpose.
Persistence & Privilege
The skill does not request always: true, does not modify other skills or system settings, and has normal invocation settings.
Assessment
This appears to be a straightforward duplicate-file finder. Before running: (1) correct the invocation mismatch (either rename tool.py to dupfile_finder.py or update SKILL.md to use 'python tool.py'); (2) run it as a non-privileged user and point it at the specific directory you want scanned (avoid /, /root, or other sensitive system directories) because the script will read any files under the provided path; (3) review the script yourself (it's short and readable) if you have concerns; (4) note the tool only lists duplicates — it does not delete files. If you plan to run it in an automated or autonomous agent context, ensure the agent cannot be instructed to scan sensitive system paths.Like a lobster shell, security has layers — review code before you run it.
latestvk978hyka6tx6sj8b91nsy2k4dx84xm9f
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
