Scan Report
5 /100
log-analyzer
Securely analyze system and application logs with automatic sensitive data redaction
A legitimate log analysis skill that reads from whitelisted sources and sanitizes sensitive data in output, with no undeclared functionality or malicious behavior.
Safe to install
Approve for use. The skill performs as documented with appropriate access controls and data redaction.
Findings 1 items
| Severity | Finding | Location |
|---|---|---|
| Low | Minor typo in code Doc Mismatch | scripts/analyzer.py:150 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | Only reads from ~/.local/share/local-rag/*.log paths |
| Shell | WRITE | WRITE | ✓ Aligned | Uses subprocess.run(['journalctl',...]) for openclaw logs |
| Network | NONE | NONE | — | No network requests found |
| Environment | NONE | READ | ✓ Aligned | os.expanduser() only for path expansion |
File Tree
2 files · 8.9 KB · 254 lines Python 1f · 199L
Markdown 1f · 55L
├─
▾
scripts
│ └─
analyzer.py
Python
└─
SKILL.md
Markdown
Security Positives
✓ Strict whitelist-based log source access (ALLOWED_SOURCES only)
✓ Comprehensive sensitive data redaction (tokens, keys, passwords, age keys)
✓ No network requests or data exfiltration
✓ No credential harvesting or environment variable enumeration
✓ No obfuscation techniques (no base64, eval, or dynamic code execution)
✓ No persistence mechanisms or startup hooks
✓ Timeout protection on journalctl subprocess (10 seconds)
✓ No arbitrary file access - only declared log paths