pdfelement-skill
v1.0.0Execute local PDF operations through PDFelement PDFToolbox on Windows or Linux. Support converting PDFs to Word, Excel, PowerPoint, images, text and other fo...
⭐ 0· 66·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the provided assets: helpers build Base64 payloads, validate the wspet:// protocol, and invoke PDFelement for conversions, OCR, optimization, etc. There are no environment variables, remote endpoints, or unrelated binaries requested that would be inconsistent with a local PDF launcher.
Instruction Scope
The runtime instructions and helper scripts read user-supplied file paths, inspect Windows registry keys for the wspet protocol, and may stop/restart the local PDFToolbox process to ensure single-instance auto-exec behavior. Those actions are within scope for a local launcher, but they are privileged (process termination, registry reads) and will act on files/paths you provide.
Install Mechanism
There is no external install step or remote download in the skill package. All helper scripts are included as files in the skill (PowerShell and Python). No arbitrary network downloads or extract/install actions are present in the manifest.
Credentials
The skill does not request secrets or unrelated credentials. It recommends standard environment variables for Linux GUI launches (DISPLAY, XAUTHORITY, DBUS_SESSION_BUS_ADDRESS, LD_LIBRARY_PATH) which are appropriate for launching a GUI app from an agent context.
Persistence & Privilege
The skill is not always-enabled and uses normal autonomous-invocation defaults. However, helpers can write a .ps1 file by copying the provided .ps1.md (the skill instructs doing so) and can forcibly stop PDFToolbox processes. These are reasonable for a local launcher but are privileged actions the user should be aware of.
Assessment
This skill appears to do what it says: it builds Base64 file payloads, checks Windows registry for the wspet:// protocol, and launches your locally installed PDFelement. Before installing or running it: (1) confirm you trust the skill source and are comfortable allowing it to inspect registry keys and stop the PDFToolbox process if necessary; (2) note it requires PDFelement 12.1.14+ installed locally and a desktop session for GUI operations on Linux; (3) the PowerShell helper may instruct you to copy a .md file to .ps1 in the skill directory (this writes to disk) — review that file yourself before executing; (4) the skill does not send files or secrets to remote servers, but it will operate on any file paths you supply, so avoid giving it sensitive files unless you intend local processing; (5) if you need higher assurance, review the included scripts (launch_wspet.ps1, launch_wspet.py, build_file_payload.py) line-by-line or run them in a sandboxed environment first.Like a lobster shell, security has layers — review code before you run it.
latestvk97308g4bk1k32db49xhkcbdwd83g09d
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
