Scan Report
0 /100
sqlite-reader
Read and query SQLite database files. Use when user wants to inspect or extract data from .sqlite files, especially OpenClaw's main.sqlite memory database.
A straightforward SQLite database reader utility with no security concerns. All functionality is properly documented and the implementation uses only Python standard library with no network, credential, or shell access.
Safe to install
This skill is safe to use. No action required.
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | scripts/read_sqlite.py:100 - export_to_csv function writes CSV when --export-csv… |
| Filesystem | READ | READ | ✓ Aligned | scripts/read_sqlite.py:135 - sqlite3.connect() reads user-provided SQLite file |
| Network | NONE | NONE | — | No network calls found in codebase |
| Shell | NONE | NONE | — | No subprocess or shell execution in codebase |
| Environment | NONE | NONE | — | No os.environ access in codebase |
| credential | NONE | NONE | — | No credential access in codebase |
File Tree
3 files · 7.6 KB · 243 lines Python 1f · 160L
Markdown 2f · 83L
├─
▾
references
│ └─
schema.md
Markdown
├─
▾
scripts
│ └─
read_sqlite.py
Python
└─
SKILL.md
Markdown
Security Positives
✓ Uses only Python standard library (sqlite3, sys, argparse, json, csv, os) - no external dependencies
✓ All functionality explicitly documented in SKILL.md
✓ No network requests or external communications
✓ No credential harvesting or environment variable access
✓ No obfuscation or encoded payloads
✓ File write is user-controlled (--export-csv requires explicit filename argument)
✓ SQL query execution is limited to SELECT operations via sqlite3 library
✓ File existence validated before access
✓ Clean, readable code with proper error handling