Jetson Temperature
v1.0.0Real-time monitoring of CPU, GPU, and multiple thermal zone temperatures on NVIDIA Jetson devices running Linux.
⭐ 0· 82·0 current·0 all-time
bykunka@wxd9199
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description state Jetson temperature monitoring and the provided script reads /sys/class/thermal/thermal_zone*/temp — exactly what is needed for that purpose. No unrelated binaries, env vars, or services are requested.
Instruction Scope
SKILL.md tells the user to run a 'jetson-temp' command and documents dependencies (/sys/class/thermal), while the bundle includes a simple scripts/temp.sh that reads thermal_zone*/temp and prints temperatures. This is consistent functionally, but SKILL.md does not document how the script is installed/registered as 'jetson-temp' (minor documentation mismatch). The runtime instructions do not access files or secrets outside the thermal subsystem.
Install Mechanism
No install spec or remote downloads. The only code is a small local bash script (220 bytes). No archives or third-party packages are fetched — minimal disk footprint and low install risk.
Credentials
The skill declares no environment variables, credentials, or config paths and the script likewise does not read any env vars or secrets. It only reads system thermal sensors under /sys, which is appropriate for the stated task.
Persistence & Privilege
The skill is not always-enabled and does not request elevated privileges or modify other skills or system-wide settings. It only reads sensor files and prints output.
Assessment
This skill is small and appears to do only what it says: read Linux thermal zone files and print temperatures. Before installing or trusting it: (1) inspect scripts/temp.sh (already provided) to confirm it matches your expectations; (2) decide how the tool will be made runnable as 'jetson-temp' (installing the script into a directory on PATH or creating an alias); (3) run it on a Jetson device only — on non-Linux systems the path may not exist; and (4) avoid running unknown code as root (no root required here since it only reads /sys, but permission on some devices may vary). If you want, I can produce an installer wrapper or a safer invocation example that runs the script without modifying system files.Like a lobster shell, security has layers — review code before you run it.
latestvk975mt7nrddtr3870athjxjszn8397c6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
