Photos
v1.0.0Organize, index, and search local photo libraries with AI-powered metadata and safe file handling.
⭐ 2· 1.2k·4 current·4 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The declared requirement (exiftool) matches the stated purpose of reading/writing EXIF and indexing photos. The SKILL.md also references additional tools (sips, heif-convert) and perceptual hashing/pHash operations that are reasonable for the domain but are not listed as required binaries; this is a minor inconsistency but explainable.
Instruction Scope
Instructions direct broad file-system access (recursive EXIF reads, creating .photo-index and .photo-trash) which is expected for a photo indexer. However, the guidance on 'vision analysis' and 'reverse geocode GPS once' is vague about where analysis or geocoding runs—there's no specification whether image pixels or GPS coordinates stay local or are sent to third-party APIs. The face-tagging rule (‘tag all similar faces if user identifies someone’) explicitly enables biometric processing. These open-ended directions give the agent significant discretion to transmit sensitive data (images, faces, locations) externally.
Install Mechanism
No install spec and no code files — instruction-only — so nothing is written or fetched at install time. That minimizes installer risk.
Credentials
The skill requests no environment variables or credentials, which keeps the declared footprint small. But the instructions imply uses (reverse geocoding, vision APIs, possible face-recognition services) that commonly require API keys. The omission of required credentials means the agent may either (a) perform services locally, (b) call unauthenticated public endpoints, or (c) prompt the user or use other agent-configured credentials. This mismatch is important to surface before use.
Persistence & Privilege
The skill does not request permanent or system-wide privileges (always:false). It creates its own per-library directories (.photo-index, .photo-trash, edited/) which is reasonable and expected for this functionality. It does not modify other skills or global agent config in the instructions.
What to consider before installing
Before installing, consider the following:
- Backup: Back up a sample of your photo library before running any bulk operations.
- Local vs remote analysis: Ask the skill author (or confirm in your agent configuration) whether 'vision analysis' and reverse geocoding run entirely locally. If the agent will send images or GPS coordinates to external APIs, you may expose sensitive location/person data.
- Face recognition: The SKILL.md calls for automatically tagging faces once a user identifies someone. This is biometric processing with privacy and legal implications; disable or require explicit consent per-person if you are uncomfortable.
- API keys: The skill lists no required credentials, but reverse geocoding and cloud vision usually need API keys. Decide which geocoding/vision providers to use and provide your own credentials if you want control over where data goes.
- Tools: Ensure exiftool is installed. If you need HEIC conversion, install sips (macOS) or heif-convert (Linux) as needed; the skill mentions these but does not require them explicitly.
- Data handling: The skill's safety rules (never overwrite originals, move deletes to .photo-trash, keep sidecars) are good. Confirm the exact path the skill will use for .photo-index/.photo-trash and whether it will index network mounts.
- Least privilege: If possible, run the skill on a test folder first and restrict it to only the directory you want indexed rather than your whole photos root.
If you need help deciding, ask the skill author how they perform vision/geocode operations (local model vs which cloud provider) and whether they will ever transmit raw image data or GPS coordinates to third parties. If they cannot provide a clear answer, treat the skill as privacy-sensitive and avoid granting it broad access to your entire photo library.Like a lobster shell, security has layers — review code before you run it.
latestvk97az5kfmbcnyh042gghcmsp2d80y13z
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🖼️ Clawdis
OSLinux · macOS · Windows
Binsexiftool
