Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
GitHub repository trust scoring and due diligence. Use when asked to analyze, audit, score, or evaluate any GitHub repo — especially for crypto/DeFi project...
GitHub repository trust scoring and due diligence. Use when asked to analyze, audit, score, or evaluate any GitHub repo — especially for crypto/DeFi project...
This item appears to require sign-in or permission before the package can be fetched. Open the source page and confirm access manually.
Use the source page and any available docs to guide the install because the item requires authentication or permission before the package can be fetched.
I tried to install a skill package from Yavira, but the item requires authentication or permission before the package can be fetched. Inspect the source page and any extracted docs, then tell me what you can confirm and any manual steps still required. Then review README.md for any prerequisites, environment setup, or post-install checks.
I tried to upgrade a skill package from Yavira, but the item requires authentication or permission before the package can be fetched. Compare the source page and any extracted docs with my current installation, then summarize what changed and what manual follow-up I still need. Then review README.md for any prerequisites, environment setup, or post-install checks.
Zero-dependency GitHub trust scorer. Runs 29 analysis modules across 12 scoring categories.
# Single repo node scripts/analyze.js <owner/repo or github-url> [flags] # From a tweet (auto-extracts GitHub links) node scripts/analyze.js <x.com-or-twitter.com-url> [flags] # Batch mode node scripts/analyze.js --file <repos.txt> [--json]
--json — JSON output (for pipelines) --oneline — compact one-line score --badge — shields.io markdown badge --verbose — show progress --token <pat> — GitHub PAT (or set GITHUB_TOKEN env) --file <path> — batch mode, one repo per line (# comments ok)
CRITICAL: Always run with GITHUB_TOKEN loaded. Without it, scores are severely degraded (missing stars, forks, commits). Before running: source ~/.bashrc (token is in ~/.bashrc as GITHUB_TOKEN). Or pass explicitly: GITHUB_TOKEN="$(grep GITHUB_TOKEN ~/.bashrc | cut -d'"' -f2)" node scripts/analyze.js ...
CategoryMaxWhat it checksCommit Health20Human vs bot, GPG sigs, code dumps, fake timestampsContributors15Bus factor, contributor diversityCode Quality25Tests, CI, license, docs, lock filesAI Authenticity15AI slop detection in code/READMESocial10Stars, forks, star/fork ratio, botted starsActivity10Recent pushes, releasesCrypto Safety5Token mints, rug patterns, wallet addressesDependency Audit10Known malicious packages, typosquatting, install hooks, lock filesFork Quality8Fork divergence, suspicious changes, gutted vs meaningful forksREADME Quality10Install guide, examples, structure, API docsMaintainability10File sizes, nesting, code/doc ratioProject Health10Abandoned detection, velocity, issue response, PR reviewOriginality5Copy-paste, template detection, backer verificationAgent Safety15Install hooks, prompt injection, secrets, CI audit, permissions
A (85+): LEGIT B (70-84): SOLID C (55-69): MIXED D (40-54): SKETCHY F (<40): AVOID
Enhanced dependency audit: Detects known malicious packages (event-stream, ua-parser-js, etc.), typosquatting attacks, install hooks, and estimates transitive dependency bloat Fork comparison: Analyzes fork divergence, detects cosmetic vs meaningful changes, flags suspicious modifications (removed CI, added wallets), identifies gutted forks Agent safety: Detects prompt injection, credential harvesting, install script hooks, obfuscated code Secrets detection: Finds hardcoded API keys, tokens, private keys via regex + entropy Network mapping: Categorizes all outbound domains (API, CDN, unknown) CI/CD audit: Checks GitHub Actions for pull_request_target, unpinned actions, secret leaks Permissions manifest: Summarizes what the code needs to run (like an app permissions list) Author reputation: Org memberships, suspicious repos, account age Backer verification: Cross-references investor claims vs committer org membership Complexity hotspots: Flags large files with deep nesting and high conditional density
# One repo per line, # for comments Uniswap/v3-core https://github.com/aave/aave-v3-core OpenZeppelin/openzeppelin-contracts
Default: rich terminal report with bar charts, sections, verdict. --json: Full structured data for programmatic use. --oneline: RepoName: 85/100 [A] — 2 flags
Keep it concise. Lead with score/grade and notable findings. Skip sections with nothing interesting. Example: "Uniswap/v3-core scored 75/B — 96% GPG-signed, 11 authors, MIT license. Flagged: abandoned (466 days no push), 2,597 transitive deps (bloated), secrets in CI run commands. Agent safety: CAUTION."
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.