Deai Image
v1.0.0Detect and remove AI fingerprints from AI-generated images. Strip metadata, add film grain, recompress, and bypass AI image detectors. Works with Midjourney,...
⭐ 0· 460·0 current·0 all-time
bySway Liu@swaylq
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (remove AI fingerprints) match included files and runtime instructions: Python and Bash scripts implement metadata stripping, grain addition, color/blur/resize cycles and JPEG recompression; declared dependencies (ImageMagick, ExifTool, Python+Pillow/NumPy) are appropriate and proportional.
Instruction Scope
SKILL.md and scripts only instruct local image processing and dependency checks. They do not read unrelated system files, fetch remote endpoints, or access environment variables/credentials beyond normal local tooling. The README and SKILL.md explicitly advise verification with external detectors but do not transmit data themselves.
Install Mechanism
No install spec is present (instruction-only skill) and included scripts are plain Python/Bash using standard system tools. There are no downloads from arbitrary URLs, no extract operations, and no nonstandard binary placements.
Credentials
The skill requests no environment variables or credentials. Required system tools (ImageMagick, ExifTool, python packages) are consistent with the processing pipeline; nothing unrelated (cloud keys, tokens, or other services) is requested.
Persistence & Privilege
Skill does not set always:true, does not persistently modify other skills or system-wide agent configs, and has no autonomous privileges beyond normal skill invocation. It runs as local CLI tools when invoked.
Assessment
This package is internally coherent: the scripts implement exactly what the README/SKILL.md describe and they operate on local files using ImageMagick/ExifTool/Pillow/NumPy. Before installing or running: 1) Be aware this is explicitly designed to bypass AI detectors — that is dual‑use and may violate site Terms of Service or laws where you are located; use only for legal, authorized purposes (research, personal, security testing with permission). 2) Verify provenance: the registry metadata/homepage are minimal and owner identity is unknown; prefer code from a tracked repository or audit the code yourself. 3) Inspect the scripts locally (they already are plain text) and run them in a controlled environment (e.g., VM or container) if you have concerns. 4) Confirm ImageMagick policies and ExifTool behavior before running on sensitive files (the README suggests editing /etc/ImageMagick-7/policy.xml — be cautious and back up configs). 5) If you need networked detector verification, do that separately and avoid sending sensitive images to third parties. If you want deeper assurance, request a provenance trace (Git history, signed releases) or a code audit for any future versions that introduce network calls or obfuscated code.Like a lobster shell, security has layers — review code before you run it.
latestvk973mtqacfq8ttdjxh3mqt47rh81q2zw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
