Screenshot Ocr

v1.0.0

截图 OCR 识别工具。截图→自动识别文字→复制/保存,适合提取图片内容、表格数据、验证码。

0· 1.9k·11 current·12 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Screenshot OCR) matches the included files and requirements. The skill only needs Python, Tesseract, and optional clipboard utilities to perform OCR; nothing requested is unrelated to OCR.
Instruction Scope
SKILL.md instructs the agent to run the included scripts/ocr.py for clipboard or file OCR and to install Tesseract/pytesseract/pillow. The runtime instructions and script operate on local images, the clipboard, and write optional output files — all within the stated purpose.
Install Mechanism
There is no install spec (instruction-only with a bundled script). No remote downloads, package installs, or archive extraction are performed by the skill itself.
Credentials
The skill requests no environment variables or credentials. The _meta.json lists python3 and tesseract as required binaries, which is appropriate for OCR. No unrelated secrets or config paths are requested.
Persistence & Privilege
always is false and the skill is user-invocable. It does not attempt to modify other skills or persist credentials; it only writes output files when explicitly asked.
Assessment
This skill appears internally consistent and runs locally: it uses Tesseract (you must install tesseract-ocr and pip packages pytesseract/pillow) and clipboard utilities (xclip on Linux, pbcopy/pbpaste on macOS) to read images and optionally copy/save recognized text. Before installing, consider: 1) The script reads any file path you pass to it and may write output files where you tell it to — avoid running it on sensitive system files. 2) Clipboard access uses platform tools and writes a temporary file (/tmp/clipboard.png) when attempting to read the clipboard; on some systems the clipboard-handling code may be buggy. 3) There are no network calls or credential requests, so it does not exfiltrate data by design. 4) If you need Windows support, the SKILL.md/script does not provide Windows clipboard handling (you will need to verify behavior). If you want added assurance, inspect or run the script locally in a sandbox before granting it wider use.

Like a lobster shell, security has layers — review code before you run it.

latestvk976qhmbjzqqdn2h04nyrhxqvh830dtr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments