Console
v1.0.0Console & terminal output reference — logging levels, ANSI colors, debugging techniques, formatters. Use when styling terminal output, implementing log syste...
⭐ 0· 115·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the provided artifacts: an instruction-only skill that documents console output, ANSI codes, logging, and debugging. It does not request unrelated credentials, binaries, or system access.
Instruction Scope
SKILL.md directs the agent to run the included scripts/script.sh subcommands, which render help text. The instructions reference a single optional config variable (CONSOLE_DIR) but do not instruct reading unrelated files, contacting external endpoints, or exfiltrating data.
Install Mechanism
No install spec is provided (instruction-only). The skill includes a local script file that will be run; there are no downloads or archive extractions from external URLs.
Credentials
The skill declares no required environment variables, secrets, or config paths. The documentation mentions respecting NO_COLOR and suggests LOG_LEVEL patterns, which are reasonable and not demanding credentials.
Persistence & Privilege
always is false and the skill is user-invocable/autonomous by default — appropriate for this kind of reference skill. It does not request persistent privileges or modify other skills/config.
Scan Findings in Context
[pre-scan-injection-signals] expected: No injection or regex-based warnings were detected; this is consistent with a documentation script that prints static content.
Assessment
This skill appears to be a safe, local reference: inspect the bundled scripts/script.sh (already provided) before running to confirm there are no unexpected commands. If you plan to run it in an automated agent, ensure the agent's runtime environment restricts network access or file writes if you want extra caution, though the visible portion of the script only emits help text and examples.scripts/script.sh:414
Environment variable access combined with network send.
Confirmed safe by external scanners
Static analysis detected API credential-access patterns, but both VirusTotal and OpenClaw confirmed this skill is safe. These patterns are common in legitimate API integration skills.Like a lobster shell, security has layers — review code before you run it.
latestvk97ftbnd8hy3cknq80vfp7v5r983bxxh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
