myskill

v1.0.0

Remove duplicate rows from CSV files by key columns. Use when asked to deduplicate CSVs or keep unique records.

0· 126·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md, and the included Python script all describe CSV deduplication and require only the input/output paths and optional key columns — nothing extra is requested.
Instruction Scope
SKILL.md directs the agent to run the included script with explicit input/output paths and optional flags. The script only reads the specified input file, processes it in memory, and writes the specified output file; it does not access other files, environment variables, or network endpoints.
Install Mechanism
No install spec is provided and no external downloads or package installs are required. The skill is instruction-only with one bundled Python script.
Credentials
The skill declares no required environment variables, credentials, or config paths, and the code does not read any environment variables or secrets.
Persistence & Privilege
Skill does not request persistent presence (always:false) and does not modify other skills or system-wide settings.
Assessment
This skill appears to be what it says: a simple CSV deduper implemented in Python with no network access and no credential requirements. Before installing or running: (1) review and back up your CSVs — the script overwrites only the output file you specify and could cause data loss if used incorrectly; (2) note the script loads the entire file into memory (may be memory-heavy for very large CSVs); (3) the script will exit if a specified key column is missing, and it lowercases keys only when --case-insensitive is used; (4) encoding errors are replaced (errors='replace'), which can alter problematic characters; (5) if you need streaming/disk-based deduplication for huge files, consider a tool designed for that. Otherwise the code is straightforward and contains no hidden network calls, obfuscated logic, or unexpected credential access.

Like a lobster shell, security has layers — review code before you run it.

latestvk970rc3pwy9xb8399kxn92f6yn834wz8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments