Crypto Tax Calc
v3.0.0Cryptocurrency tax reference — IRS guidance, FIFO/LIFO/HIFO cost basis methods, Form 8949, tax loss harvesting, and DeFi transaction categorization
⭐ 0· 426·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (crypto tax reference) matches the included SKILL.md and the script: the content is purely reference documentation about tax rules, cost-basis methods, reporting, and migration to tax software. No unrelated services, credentials, or binaries are requested.
Instruction Scope
SKILL.md explicitly states outputs are plain-text reference docs, no external API calls or credentials are needed. The provided shell script defines commands (cmd_intro, cmd_standards, etc.) that emit heredoc documentation and do not reference files, env vars, or network endpoints in the visible portion.
Install Mechanism
No install spec is present (instruction-only). A single shell script is included but appears to only print documentation; nothing is downloaded or written to disk by an installer.
Credentials
The skill declares no required environment variables, credentials, or config paths. The instructions and visible script do not attempt to read environment variables or require secrets.
Persistence & Privilege
always is false (not forced everywhere) and the skill does not request elevated or persistent system privileges. It does not modify other skills or system-wide settings in the provided artifacts.
Assessment
This skill appears coherent and only provides reference documentation about crypto taxes. Before installing or enabling autonomous invocation, you may want to: (1) review the remainder of scripts/script.sh (the file shown was truncated) to confirm there are no hidden network calls or execs; (2) run the script in a sandbox to verify behavior; and (3) avoid granting any unrelated credentials (there is no need for API keys). If you plan to let the agent invoke the skill autonomously, consider the usual caution around any skill that can run code—limit its scope and monitor outputs.Like a lobster shell, security has layers — review code before you run it.
chinesevk9702mtsx2jd8rhkprgrtm06h582pj7klatestvk9784s6bgrvt55vnkkx5g6v7bh83ent7productivityvk9718zcwwr232h5g77fy96cb0982sgh2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
