Log Analyzer

v1.0.0

Read a log file, extract ERROR/WARN/CRITICAL lines, group similar messages, and produce a concise summary report. Use when analyzing application logs, agent...

0· 219·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for neo1307/neo1307-log-analyzer.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Log Analyzer" (neo1307/neo1307-log-analyzer) from ClawHub.
Skill page: https://clawhub.ai/neo1307/neo1307-log-analyzer
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install neo1307-log-analyzer

ClawHub CLI

Package manager switcher

npx clawhub@latest install neo1307-log-analyzer
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, SKILL.md, and index.js all align: the code reads an input log, extracts severity lines, groups similar messages, and writes a report. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md instructs running index.js with an --input path. The runtime code will read whatever file path the user supplies (and will write a report to the working directory by default). This is expected for a log analyzer, but the user should avoid pointing it at sensitive system files.
Install Mechanism
No install spec — instruction-only skill with a small included Node.js script. Nothing is downloaded or installed by the skill itself.
Credentials
The skill requests no environment variables or credentials and does not read other config paths. Its access to the filesystem is limited to the user-specified input path and a user-writable output path.
Persistence & Privilege
always:false and normal invocation. The script writes a report file (default ./out/log_analysis_report.md) and prints a small JSON result to stdout — no attempt to persist beyond that or modify other skills/settings.
Assessment
This tool appears coherent and contains no hidden network or credential access. Before running, confirm the input path points only to logs you want analyzed (do not point it at sensitive system files like /etc/shadow, SSH keys, or other secrets). The script writes a Markdown file (default ./out/log_analysis_report.md) in the current working directory. Run it in a controlled environment if you are unsure, and inspect the generated report and console output. If you need stricter isolation, run it inside a container or VM.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bkpyzz7rygtxj73nkeb5han838ppw
219downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

Log Analyzer

Read a target log file, isolate important severity lines, group similar messages, and emit a Markdown summary.

Workflow

  1. Confirm the input log path.
  2. Run index.js with --input <logfile> and optional --out <report.md>.
  3. Review the grouped output for dominant error families.
  4. Use the report as a triage artifact, not as the only source of truth.

Output

Always include:

  • total scanned lines
  • WARN / ERROR / CRITICAL counts
  • grouped issue buckets
  • sample lines
  • suggested first checks

Comments

Loading comments...