Smart File Organizer
v1.0.0Scans and categorizes files in a directory, detects duplicates, and reorganizes them into a clear folder structure with safety features and rollback options.
⭐ 1· 899·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description align with the instructions: scanning a directory, detecting duplicates, proposing and performing moves, and logging/rollback are all coherent with a 'file organizer' skill. The skill does not request unrelated binaries, env vars, or config paths.
Instruction Scope
SKILL.md stays within the feature set but is high-level and omits operational safeguards: it doesn't specify protections for symlinks, system or hidden files, permission errors, how rollback is implemented, whether metadata (permissions/ownership/timestamps) are preserved, or how very large files are handled. The skill assumes the agent will be granted filesystem access to arbitrary target paths — that is expected for this purpose but warrants user caution.
Install Mechanism
Instruction-only skill with no install steps or external downloads; this minimizes risk from third-party code being written to disk.
Credentials
No environment variables, credentials, or config paths are requested. The filesystem access implied by the instructions is proportional to the stated functionality.
Persistence & Privilege
always is false and the skill does not request persistent/system-wide changes. Autonomous invocation is allowed (platform default) but is not combined with other privilege or credential requests.
Assessment
This skill appears to do what it says, but it operates directly on your files — take precautions before running it: (1) use the Dry Run mode first and carefully review the proposed plan; (2) test on a small, non-critical folder before running on important data; (3) avoid pointing it at system directories (/, /etc, user home root) or any directory containing secrets or active project state unless you understand the consequences; (4) confirm where reorganization_log.txt will be written and ensure it does not leak sensitive filenames to an unintended location; (5) confirm the rollback procedure and have backups available (e.g., a full copy or snapshot) in case moves don't preserve metadata or ownership as you expect; (6) check how the agent handles symlinks, permissions, and very large files before broad use. If you need more assurance, ask the skill author (or provide additional SKILL.md detail) about symlink handling, metadata preservation, and the exact rollback mechanism.Like a lobster shell, security has layers — review code before you run it.
automationvk974xdpanxn5d9ms0n6mwvjecs81522vcleanupvk974xdpanxn5d9ms0n6mwvjecs81522vduplicatesvk974xdpanxn5d9ms0n6mwvjecs81522vfilesvk974xdpanxn5d9ms0n6mwvjecs81522vlatestvk974xdpanxn5d9ms0n6mwvjecs81522vorganizationvk974xdpanxn5d9ms0n6mwvjecs81522v
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
