Disk Watch

v1.0.2

Monitor disk space across drives. Alert before disks fill up. Track usage trends, find space hogs, suggest cleanup. Every server needs this.

0· 339·2 current·2 all-time
byShadow Rose@theshadowrose
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included code: DiskWatch inspects mounted drives, runs platform-specific disk commands (df/wmic), scans directories for largest consumers, and stores a local history. There are no unrelated credentials, network calls, or external services requested.
Instruction Scope
SKILL.md describes local disk monitoring and the code follows that scope. The runtime instructions and API examples do not request unrelated files or credentials. The implementation reads directories, executes df/wmic, and writes a local history file — all consistent with the stated features.
Install Mechanism
No install spec or external downloads are present. The skill is instruction-only in the registry (though it includes source files); nothing is fetched or extracted from remote URLs during install.
Credentials
The skill declares no required environment variables or credentials and the code does not read env vars. It only uses local filesystem and OS commands, which are proportionate to disk-monitoring functionality.
Persistence & Privilege
The skill is not forced-always, does not modify other skills, and only writes a local history file under the system temp directory. That limited local persistence is appropriate for trend tracking.
Assessment
This skill appears to do what it says: run local disk-usage commands, scan directories up to a shallow depth, and store a small JSON history in the system temp folder. Before installing, consider: run it with a non-privileged account (it will read filesystem metadata and execute df/wmic), review or test the code in a safe environment, and be cautious about calling findHogs on sensitive system paths (it will traverse directories you pass it). Also note there is no upstream homepage or verified publisher information — if provenance matters, verify the author or run inside a container/isolated VM.

Like a lobster shell, security has layers — review code before you run it.

alertsvk973ah2w0x6zhxxw9014gd2fm182ktgydiskvk973ah2w0x6zhxxw9014gd2fm182ktgydisk-watchvk978kgptw82h3qezzwjfs6140x82j708latestvk973ah2w0x6zhxxw9014gd2fm182ktgymonitoringvk973ah2w0x6zhxxw9014gd2fm182ktgystoragevk973ah2w0x6zhxxw9014gd2fm182ktgysystemvk973ah2w0x6zhxxw9014gd2fm182ktgy

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments