Payback
v1.0.0Payback reference tool. Use when working with payback in finance contexts.
⭐ 0· 67·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the delivered functionality: an offline reference CLI that prints finance guidance. The SKILL.md commands map directly to the included scripts/script.sh commands; there are no unexpected external services, credentials, or unrelated binaries requested.
Instruction Scope
Runtime instructions only invoke the bundled shell script with simple subcommands. The script reads no external files, does not access environment variables, and does not transmit data. It only emits static help and reference text, so the instruction scope stays within the stated purpose.
Install Mechanism
There is no install spec (instruction-only with an included script). Nothing is downloaded or extracted during install, and no external package registries or remote URLs are used by the runtime code.
Credentials
The skill requires no environment variables, credentials, or config paths. The script does not reference any secret-like variables or unrelated system configuration, so requested environment access is proportionate.
Persistence & Privilege
The skill is not marked always:true and does not attempt to modify agent/system configuration. It runs as a simple local script and does not request persistent privileged presence.
Assessment
This skill is a small, local CLI that prints finance reference text and appears safe. Before installing, confirm you trust the BytesAgain source repo and review the included script (scripts/script.sh) for your own assurance — it runs locally and performs only text output. Note: the help text contains a minor bug (the VERSION variable is printed literally in one heredoc) but that is an implementation detail, not a security issue. If you plan to run agents that can invoke skills autonomously, remember this skill has default autonomous invocation enabled, but it has no network or credential access so its autonomous actions are low-risk.Like a lobster shell, security has layers — review code before you run it.
latestvk97529fgrnngynb4vy1ztversd83ef0h
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
