Image Resizer

v1.0.0

图片分辨率调整工具。Use when user needs to resize images to specific dimensions. Supports custom size, batch resize, aspect ratio preservation. 图片缩放、分辨率调整、图片裁剪。

0· 53·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (image resizing, presets, batch processing) match the content of SKILL.md and the included Python example. Required binary (python3) and the listed dependency (Pillow) are appropriate and proportional to the stated purpose.
Instruction Scope
SKILL.md contains concrete Python code that reads image files from provided paths, resizes them, and writes outputs. Instructions do not reference unrelated files, environment variables, credentials, or external endpoints; the notes explicitly state local processing only.
Install Mechanism
This is an instruction-only skill with no install spec or downloads. The SKILL.md mentions 'pip install pillow' as a dependency; that is reasonable and low risk compared with downloading arbitrary binaries or archives.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for a local image-resizing utility.
Persistence & Privilege
The skill is not marked 'always:true' and requests no elevated or persistent system-wide privileges. Its runtime behavior (local file I/O, no config modification) is limited in scope.
Assessment
This skill appears to be a straightforward local image-resizer implemented with Python/Pillow. Before installing, ensure you: (1) trust the skill source (it's instruction-only with no homepage), (2) have python3 and are willing to install the Pillow package via pip, and (3) will provide the agent only the image files/directories you want processed (the agent needs read/write access to those paths). There are no network calls or credential requests in the SKILL.md, so it does not appear to exfiltrate data, but avoid giving it access to sensitive images unless you trust the environment that will run the code.

Like a lobster shell, security has layers — review code before you run it.

latestvk9720j1v51tf4hv6h5tay89zcx83xhzg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📐 Clawdis
Binspython3

Comments