Orc

v1.0.0

Apache ORC columnar storage format reference. File structure with stripes and indexes, schema types with evolution rules, compression codecs (ZLIB/SNAPPY/ZST...

0· 74·0 current·0 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description describe an ORC reference; SKILL.md and scripts/script.sh provide documentation and a small CLI-style help script that align with that purpose. No unrelated privileges, binaries, or credentials are requested.
Instruction Scope
Runtime instructions are documentation and examples for orc-tools, pyarrow, Java APIs, Hive, and Spark. The script only prints help/text and example commands; it does not instruct reading unrelated system files, environment secrets, or exfiltrating data.
Install Mechanism
No install spec is provided (instruction-only). The only external download shown in examples points to the official Apache CDN (dlcdn.apache.org), a reasonable source for orc-tools. No extract-from-arbitrary-URL installs are present.
Credentials
No required environment variables, credentials, or config paths are declared or used. Example commands do not reference hidden tokens or secrets.
Persistence & Privilege
always is false; the skill is user-invocable and does not request persistent system/agent changes or access to other skills' configs. disable-model-invocation is default (agent may call it), which is normal and not combined with other concerning factors.
Assessment
This skill appears to be a documentation/reference tool for Apache ORC and contains a small shell script that prints help and example commands. It requests no credentials and does not perform network actions by itself. Before running any included scripts or example wget/java commands, inspect them locally and only download jars from trusted sources (the SKILL examples use the Apache CDN). If you plan to let an agent invoke the skill autonomously, note it has no elevated privileges and only outputs documentation, but always review commands the agent would run against your system or data before permitting execution.

Like a lobster shell, security has layers — review code before you run it.

latestvk973sk6qrptn15z8q6pgedwsfn83gmq6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments