Vrf

v1.0.0

Analyze vrf operations. Use when you need to understand vrf mechanisms, evaluate protocol security, or reference on-chain concepts.

0· 146·1 current·1 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for bytesagain1/vrf.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Vrf" (bytesagain1/vrf) from ClawHub.
Skill page: https://clawhub.ai/bytesagain1/vrf
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install vrf

ClawHub CLI

Package manager switcher

npx clawhub@latest install vrf
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (VRF analysis) match the included CLI: the skill provides commands to add/list/search/export entries and basic stats/config management. No unrelated capabilities are requested.
Instruction Scope
SKILL.md instructs the agent to run the included scripts/script.sh with specific commands. The script only reads/writes files under the data directory and prints local info; it does not read other system files, environment variables (except optional VRF_DIR), or send data externally.
Install Mechanism
No install spec; the skill is instruction-only with an included script. Nothing is downloaded or extracted from remote URLs.
Credentials
No required environment variables or credentials. The script uses an optional VRF_DIR override to change the data directory; this is proportionate to the stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent platform privileges or modify other skills' configuration. It persists only its own data/config under the user data directory.
Assessment
This skill appears safe and self-contained: it runs a local shell script that stores entries in ~/.vrf by default and does not transmit data or ask for secrets. Before installing, consider: (1) data is stored plaintext in ~/.vrf/data.jsonl and config.txt — do not store sensitive secrets there; (2) you can override the directory with VRF_DIR if you want data elsewhere; (3) the script uses common UNIX tools (grep/sed/tail) and sed -i behavior can differ on macOS (BSD sed) — not a security issue but may affect editing; (4) if you require extra assurance, review the script file locally (scripts/script.sh) to confirm behavior. Overall the skill is coherent with its description.

Like a lobster shell, security has layers — review code before you run it.

latestvk971msfa3m8ywxkgeg6w0fn9f183ay7p
146downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

Vrf

Analyze vrf operations. Use when you need to understand vrf mechanisms, evaluate protocol security, or reference on-chain concepts.

When to Use

  • status: Show current status
  • add: Add new entry
  • list: List all entries
  • search: Search entries
  • remove: Remove entry by number
  • export: Export data to file
  • stats: Show statistics
  • config: View or set config

Commands

status

scripts/script.sh status

Show current status

add

scripts/script.sh add

Add new entry

list

scripts/script.sh list

List all entries

search

scripts/script.sh search

Search entries

remove

scripts/script.sh remove

Remove entry by number

export

scripts/script.sh export

Export data to file

stats

scripts/script.sh stats

Show statistics

config

scripts/script.sh config

View or set config

help

scripts/script.sh help

version

scripts/script.sh version

Configuration

Use scripts/script.sh config <key> <value> to customize behavior.

VariableDescription
VRF_DIRData directory (default: ~/.vrf/)

Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

Comments

Loading comments...