Pdf Pro

v1.0.1

Provide PDF editing tools including merge, split, rotate, compress, convert, encrypt/decrypt, extract pages, and view PDF metadata.

1· 1.1k·6 current·6 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (PDF merge, split, rotate, compress, convert, encrypt/decrypt, metadata) match the included Python script and declared dependencies. There are no unrelated required binaries, env vars, or config paths.
Instruction Scope
SKILL.md asks users to provide local PDF/image file paths and to install the listed Python packages. The runtime instructions and code operate on the supplied files only; they do not instruct reading unrelated system files, environment variables, or contacting external endpoints.
Install Mechanism
No install spec (instruction-only), which limits automatic code installation. The skill includes a Python script and recommends installing packages via pip; installing dependencies from PyPI is normal but carries the usual supply-chain considerations (untrusted packages). There is no download-from-arbitrary-URL behavior in the code.
Credentials
The skill requires no credentials or environment variables. The dependencies listed (PyPDF2, pdfplumber, Pillow, reportlab, pypdfium2) are appropriate for PDF/image processing.
Persistence & Privilege
The skill does not request persistent/always-on privileges, does not modify other skills' settings, and does not attempt to store credentials. Autonomous invocation is permitted by platform default but is not combined with other risky factors here.
Assessment
This skill appears to do only local PDF processing. Before installing or running it: (1) Review the full script yourself (or with someone you trust) to confirm no network calls or hidden behavior; the provided portion shows only file I/O. (2) Install Python dependencies from trusted sources and consider pinning versions (pip install with explicit versions). (3) Run the tool in a sandboxed environment if you will process sensitive documents (it will read/write any file paths you provide). (4) Be cautious when supplying passwords for encrypt/decrypt operations and avoid using the skill on highly-sensitive material without review. Finally, verify the skill author/source if provenance is important (homepage/source are empty).

Like a lobster shell, security has layers — review code before you run it.

latestvk976qrq3hvm9wgqyrv058b76p58312bv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments