Regexpal

v3.0.0

Test and debug regex patterns against sample text. Use when checking match groups, validating patterns, generating replacements, linting syntax.

0· 232·0 current·0 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name, description, SKILL.md commands, and the included scripts align: the skill provides test/match/replace/extract/explain behaviors for regexes. Minor incoherence: SKILL.md and the script require python3, but the registry metadata lists no required binaries — the skill will fail at runtime if python3 is not present.
Instruction Scope
Runtime instructions and the script only operate on the provided pattern, text, or file paths and print results to stdout/stderr. The script validates file existence and does not read other system config or environment variables. It does not contact external endpoints in the visible code. One note: an example in SKILL.md uses shell arithmetic in a replacement (v\1.$((\\2+1))) which the script passes straight to Python's re.sub, so that example may be misleading but not malicious.
Install Mechanism
No install spec and no external downloads — this is an instruction-only style skill with a bundled shell script. Nothing is being fetched from remote URLs or installed automatically.
Credentials
The skill does not request environment variables, credentials, or config paths. The script accesses only files specified by the user and uses python3 from PATH; no secrets or unrelated services are requested.
Persistence & Privilege
always is false and the skill does not attempt to modify other skills or global agent configuration in the visible code. It does not request persistent presence or elevated privileges.
Assessment
This skill appears to be a local regex toolkit. Before installing: ensure you have python3 on the machine (SKILL.md and the script require it), and be aware the tool will read any file path you pass to it — do not run it on sensitive files unless you trust the environment. There are no network calls or credential requests in the visible code. Note the SKILL.md example that uses shell arithmetic in a replacement may not work as shown because the script forwards the replacement string to Python's re.sub without shell evaluation. If you want higher assurance, review the rest of the script (the file was truncated in the provided view) to confirm there are no hidden network calls or unexpected behavior in the omitted portion.

Like a lobster shell, security has layers — review code before you run it.

latestvk97crc8td217dpqgmtkc1ef5j5837sv4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments