Uuidgen

v3.0.0

Generate UUIDs, short IDs, and nano IDs. Use when creating database keys, minting session tokens, generating unique filenames, or producing batch IDs.

0· 258·1 current·1 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description describe UUID generation/validation and the included script implements only those features (v4 generation, batch, validate, extract, short IDs). The tool optionally uses /proc, python3, or /usr/bin/uuidgen which are directly relevant to random/UUID generation.
Instruction Scope
SKILL.md and the script operate on local inputs and standard system sources of entropy (/proc/sys/kernel/random/uuid, /dev/urandom) and standard utilities (od, grep, tr, head). No instructions read unrelated user files, environment variables, or send data to external endpoints.
Install Mechanism
No install spec or remote downloads are used; this is instruction-only with an included shell script. Nothing is fetched from external URLs during install.
Credentials
The skill declares no required env vars, no credentials, and the runtime script does not access secrets or external service tokens. It may call python3 or /usr/bin/uuidgen if available, which is appropriate for the purpose.
Persistence & Privilege
always is false and the skill does not request permanent system-wide changes or modify other skills. It only provides an executable script the agent can run when invoked.
Assessment
This skill appears coherent and limited to generating and validating IDs using local system entropy and standard utilities; it does not request credentials or network access. Before installing, note: (1) the included shell script will be executed by the agent in its environment—review it if you require assurance it won't access other files; (2) it reads /proc and /dev/urandom and may call python3 or /usr/bin/uuidgen depending on availability, which is expected for this functionality; (3) the short 8-character IDs are small and have a higher collision risk and are not suitable as secure tokens or globally unique identifiers for high-risk use cases—use full UUID v4 for uniqueness; and (4) batch generation supports up to 1000 IDs. If you need cryptographically-secure tokens for authentication, verify your threat model and consider a dedicated crypto library rather than short IDs.

Like a lobster shell, security has layers — review code before you run it.

latestvk970xdpstm3yaw9jhx8dfgssd18371g2

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments