Sensitive Info Protection

v1.0.0

Sensitive information real-time protection skill that automatically detects, alerts, and handles sensitive data in user interactions. Supports custom detecti...

0· 117·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (real-time sensitive-data detection, custom rules, desensitization) align with the contained files: a Python detection engine (scripts/detector.py, scripts/models.py), built-in rules (scripts/default_rules.json), a CLI (scripts/cli.py), docs, and a small client-side UI asset (assets/sensitive-interaction.js). Required binary is only python3, which is appropriate.
Instruction Scope
SKILL.md and code limit behavior to scanning text, loading local JSON rule files, adding/removing rules, printing or desensitizing content, and a UI script to inject action buttons into a web chat. There are no instructions to read system secrets, environment variables, or to transmit detected data externally. Note: load_config and the CLI accept arbitrary file paths — the skill will read any file you point it at (expected but worth considering).
Install Mechanism
No install spec; this is instruction-plus-code meant to run where python3 is available. No remote downloads or extracted archives are used in the repository files provided.
Credentials
The skill requests no environment variables or credentials. The default rules include patterns for tokens (OpenAI, GitHub, AWS) which is expected for detection; there are no unrelated credential requirements.
Persistence & Privilege
Skill flags are default (always:false, user-invocable:true, model invocation allowed). The skill does not request permanent platform-wide privileges or modify other skills. The included browser UI asset injects buttons into the DOM when executed in a page context — this is a local client-side helper, not an autonomous persistent installer.
Assessment
This skill appears coherent and implements what it describes. Before installing or enabling it, consider: (1) it will read any config file path you provide (via load_config or CLI) so avoid pointing it at files you don't want parsed; (2) its detection is regex-based — review and test default_rules.json and any custom rules to avoid false positives/overblocking; (3) assets/sensitive-interaction.js injects UI buttons into a webchat DOM — review that script if you plan to run it in a browser to ensure its behavior matches your expectations (it manipulates input fields and triggers send actions); (4) no network exfiltration or credential usage is present in the code, but always review custom rule sources before importing dynamic rules. If you want extra assurance, run the provided tests (tests/test_basic.py) in a sandboxed environment first.

Like a lobster shell, security has layers — review code before you run it.

latestvk976cpe51jmrtqcr5s1qz3sr09839r5m

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binspython3

Comments