Artifact Redactor

v1.0.5

Public OpenClaw skill for redacting private paths, secret-like strings, private URLs, and common PII from Markdown, JSON, logs, and other text artifacts befo...

0· 74·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the shipped code and required binaries (python). The scripts focus on scanning and redacting text files and produce reports; no unrelated services, credentials, or tools are requested.
Instruction Scope
SKILL.md explicitly instructs running the included Python scripts against a user-provided directory or file. The scripts read filesystem artifacts (text-only candidates), write a redacted output tree and JSON/Markdown reports — this is expected behavior for a redaction tool. Note: the scripts will read any files you point them at and write output to disk; skipped binary files are surfaced for manual review.
Install Mechanism
No install spec; this is instruction-and-script based and only requires Python on PATH. No downloads, package installs, or external installers are present.
Credentials
No environment variables, credentials, or config paths are requested. Only python/python3 is required, which is proportionate to the stated functionality.
Persistence & Privilege
Skill is user-invocable and not always-enabled. It does not modify other skills or system-wide agent settings. Scripts operate on user-provided paths only.
Assessment
This skill appears coherent and contains readable Python scripts that do the redaction work locally. Before installing/using: (1) run it on a copy of your artifacts (not originals) to verify behavior; (2) confirm you have Python 3.9+ available; (3) inspect skipped-files output and perform manual review for binaries or unsupported files; (4) understand the shipped regexes may not catch every secret — consider running an additional secret-scanner if needed; (5) because the tool reads whatever path you give it, only point it at intended directories and avoid running it against system or unrelated repositories.

Like a lobster shell, security has layers — review code before you run it.

artifactsvk977z9xydd81kqb3q67a8dzyrn84wrt8latestvk977z9xydd81kqb3q67a8dzyrn84wrt8openclawvk97cm4gj502p8tcgsnh9t49sfd84s3e0privacyvk977z9xydd81kqb3q67a8dzyrn84wrt8redactionvk977z9xydd81kqb3q67a8dzyrn84wrt8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Any binpython3, python

Comments