扫描报告
0 /100
sqlite-reader
Read and query SQLite database files. Use when user wants to inspect or extract data from .sqlite files, especially OpenClaw's main.sqlite memory database.
A straightforward SQLite database reader utility with no security concerns. All functionality is properly documented and the implementation uses only Python standard library with no network, credential, or shell access.
可以安装
This skill is safe to use. No action required.
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | scripts/read_sqlite.py:100 - export_to_csv function writes CSV when --export-csv… |
| 文件系统 | READ | READ | ✓ 一致 | scripts/read_sqlite.py:135 - sqlite3.connect() reads user-provided SQLite file |
| 网络访问 | NONE | NONE | — | No network calls found in codebase |
| 命令执行 | NONE | NONE | — | No subprocess or shell execution in codebase |
| 环境变量 | NONE | NONE | — | No os.environ access in codebase |
| 凭据 | NONE | NONE | — | No credential access in codebase |
目录结构
3 文件 · 7.6 KB · 243 行 Python 1f · 160L
Markdown 2f · 83L
├─
▾
references
│ └─
schema.md
Markdown
├─
▾
scripts
│ └─
read_sqlite.py
Python
└─
SKILL.md
Markdown
安全亮点
✓ Uses only Python standard library (sqlite3, sys, argparse, json, csv, os) - no external dependencies
✓ All functionality explicitly documented in SKILL.md
✓ No network requests or external communications
✓ No credential harvesting or environment variable access
✓ No obfuscation or encoded payloads
✓ File write is user-controlled (--export-csv requires explicit filename argument)
✓ SQL query execution is limited to SELECT operations via sqlite3 library
✓ File existence validated before access
✓ Clean, readable code with proper error handling