Bmi
v2.0.1Calculate BMI, log weight entries, and chart body composition trends. Use when tracking fitness progress, setting weight goals, or reviewing data.
⭐ 0· 199·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description promise logging, charting, and export. The included script implements those features and stores data under ~/.local/share/bmi; it does not request unrelated credentials, binaries, or external services.
Instruction Scope
SKILL.md and the script are limited to local operations (reading/writing logs, simple searches, exports, and status). There are no instructions to read system-wide secrets, network endpoints, or other users' config files. The skill does log user-provided strings to local files—so it will persist any input you give.
Install Mechanism
No install spec or external downloads are present; the repository contains an instruction file and a shell script. Nothing is fetched from remote URLs or written outside the user's home directory.
Credentials
The skill declares no required environment variables, credentials, or config paths. All file access is confined to the DATA_DIR under the user's home directory.
Persistence & Privilege
always is false; the skill does not request permanent platform-wide presence or modify other skills/configs. Its persistence is limited to creating and updating files in ~/.local/share/bmi.
Assessment
This is a small, local CLI that stores everything in ~/.local/share/bmi and does not contact external services. Before installing or running: (1) review the script if you want to confirm behavior; (2) avoid entering sensitive secrets (passwords, tokens) into log entries because all input is recorded; (3) note there is no formal install step in the metadata — decide how the bmi script will be placed on your PATH (or run it directly); (4) minor functional notes: the export JSON branch appears to append a literal "\n]" (possible formatting bug), and the search command passes the user term directly to grep (a leading '-' could be parsed as an option). None of these are malicious, but they are worth being aware of.Like a lobster shell, security has layers — review code before you run it.
latestvk976cc6jswxyrdsfy6e1fxnf3n83557f
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
