Workspace Analyzer

v1.1.0

Analyzes OpenClaw workspace structure and content to identify maintenance needs, bloat, duplicates, and organization issues. Outputs a JSON report for the ag...

0· 484·3 current·4 all-time
byohnednez@zendenho7
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description say it scans an OpenClaw workspace and the code reads and analyzes markdown files to produce a JSON report. Required binaries (python3) and the included scripts are appropriate for this purpose.
Instruction Scope
SKILL.md and analyzer.py are read-only analyzers that scan .md files under a specified root and output JSON. However, the tool accepts an arbitrary --root path (so an agent or user could point it at any filesystem location), and the SKILL.md contains "Fix Instructions for Agents" suggesting the agent may take subsequent actions based on the report. The analyzer itself does not transmit data externally or require secrets.
Install Mechanism
No install spec; this is instruction/code-only and requires python3. Nothing is downloaded or executed from remote URLs. The included files are local and self-contained.
Credentials
The skill requests no environment variables or credentials and does not access external services. The data it reads (files under the provided root) is consistent with its purpose.
Persistence & Privilege
always is false and the skill does not request persistent system privileges or modify other skills' config. Autonomous invocation (disable-model-invocation=false) is the platform default; combined with this skill's limited scope, it does not suggest elevated privilege requirements.
Assessment
What to consider before installing or running: - Inspect run.sh before executing: the provided run.sh contains what looks like an embedded Python snippet and appears malformed; do not run the script blindly. Prefer running analyzer.py directly (python3 scripts/analyzer.py ...) if you trust the code. - Limit the scan root: by default it targets ~/.openclaw/workspace, which is appropriate. Avoid passing --root=/ or other system-wide paths unless you explicitly intend to scan them—the analyzer will read any files it is pointed at. - Review output before allowing automated fixes: the analyzer only reports issues and recommendations, but SKILL.md includes guidance for an agent to act. Only permit an automated agent to modify files (consolidate, delete, edit) after you have reviewed the JSON report. - Confirm no external transmission: analyzer.py reads local files and writes a JSON report (e.g., /tmp/workspace-analysis.json) and does not include network calls. If you later modify the skill to add 'fix' actions, review any new code for upload/endpoints. - If you have strict security policies, run the script in an isolated environment (container or VM) first and inspect results and any code changes before allowing the agent to act on your real workspace.

Like a lobster shell, security has layers — review code before you run it.

aivk97fxr6y0w3z6xvpnhkm8205z981jpdyanalysisvk97fxr6y0w3z6xvpnhkm8205z981jpdylatestvk9705rk4jnqtjvcj21pb874b1n81pawamaintenancevk97fxr6y0w3z6xvpnhkm8205z981jpdyworkspacevk97fxr6y0w3z6xvpnhkm8205z981jpdy

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📊 Clawdis
Binspython3

Comments