Regex Patterns

v1.0.0

Practical regex patterns across languages and use cases. Use when validating input (email, URL, IP), parsing log lines, extracting data from text, refactoring code with search-and-replace, or debugging why a regex doesn't match.

1· 3.9k·16 current·16 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (regex patterns for validation, parsing, extraction, refactoring) aligns with the actual content. The SKILL.md includes examples for grep, JavaScript, and Python, which matches the declared anyBins requirement (grep, python3, node). No unrelated binaries, env vars, or installs are requested.
Instruction Scope
The instructions are an extensive cookbook of patterns and command-line examples (many grep -P invocations) that operate on typical file paths (access.log, syslog, src/*.ts, file.txt). This is coherent for a regex reference, but those examples will cause the agent to read local files when executed — which is expected for this use case but could surface sensitive data if run against system or project directories.
Install Mechanism
No install specification or code is provided (instruction-only). That minimizes disk/write risk — nothing is downloaded or written by the skill itself.
Credentials
The skill requests no environment variables or credentials. The lack of secrets or unrelated service tokens is proportionate to a regex-patterns reference.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges. Model invocation is enabled (the platform default), which is normal for skills of this type.
Assessment
This skill is a straightforward, instruction-only regex cookbook and appears internally consistent. Things to consider before installing or allowing autonomous use: (1) provenance — the source/homepage is unknown, so review the patterns yourself before using them in production; (2) the examples run grep/python/node against local files (logs, src/), so avoid running them against sensitive directories unless you trust the agent and understand the commands; (3) several provided regexes are simplified and may produce false positives/negatives (especially for emails, URLs, and IPv6) — validate them against your datasets; and (4) because it’s instruction-only there’s low install risk (no downloads or secrets requested), but exercise caution about autonomous invocation if you do not want automated scanning of local files.

Like a lobster shell, security has layers — review code before you run it.

latestvk971c1e8xz1nexyb63gs7ndjxh80f16z

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔤 Clawdis
OSLinux · macOS · Windows
Any bingrep, python3, node

Comments