Cad

v2.0.2

cad reference tool

0· 332·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (cad reference tool) match the provided assets: SKILL.md and a single shell script that print reference documentation. There are no unexpected environment variables, binaries, or cloud credentials requested.
Instruction Scope
SKILL.md explicitly states the skill outputs reference docs with no external API calls or network access. The bundled scripts only use local shell builtins (cat, echo) and dispatch printed documentation for the declared commands; they do not read unrelated files, access environment variables, or transmit data.
Install Mechanism
No install spec is provided (instruction-only with a script file). Nothing is downloaded or written to disk by an installer; the only code is the included script.sh which is small and readable.
Credentials
The skill declares no required env vars, credentials, or config paths and the runtime script does not reference any secret-bearing environment variables. The requested privileges are proportionate to a local reference tool.
Persistence & Privilege
always is false and the skill does not request persistent system modifications. It will only run when invoked and does not modify other skills or system-wide agent settings.
Assessment
This skill appears to be a harmless, self-contained documentation/reference tool. Before installing, confirm you trust the author (bytesagain.com) since invoking the skill will execute the included shell script on the host — although the script only prints static text. Review the script if you want to verify there are no unexpected commands; note a minor non-security bug: the help heredoc uses single quotes so the $VERSION token will not expand (harmless). If you need stronger guarantees, run the script in a sandbox or inspect it in your environment before allowing autonomous execution.

Like a lobster shell, security has layers — review code before you run it.

latestvk979g45vfec66z32rpfjxjm1wh83fsx4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments