Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Local, offline AI-powered file type detection — no network, no API keys
Local, offline AI-powered file type detection — no network, no API keys
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Local-only, offline file type detection. Uses an embedded ML model (Google Magika) to identify 214 file types by content — no network calls, no API keys, no data leaves the machine. All inference runs on-device via ONNX Runtime.
Identify unknown files by their content (not just extension) — locally, without sending data anywhere Verify that a file's extension matches its actual content Check MIME types before processing uploads or downloads Triage files in a directory by type Detect extension mismatches and masquerading (e.g., .pdf.exe, .xlsx.lnk) Flag suspicious polyglot-style payloads (for example PDF/ZIP or PDF/HTA-style chains) When privacy matters — file bytes never leave the local machine
pip install detect-file-type-local From source: pip install -e /path/to/detect-file-type-skill
detect_file_type path/to/file
detect_file_type file1.pdf file2.png file3.zip
detect_file_type --recursive ./uploads/
cat mystery_file | detect_file_type - # Optional best-effort fast path (head only) cat mystery_file | detect_file_type --stdin-mode head --stdin-max-bytes 1048576 -
detect_file_type --json file.pdf # JSON (default) detect_file_type --human file.pdf # Human-readable detect_file_type --mime file.pdf # Bare MIME type
python -m detect_file_type path/to/file
Single file returns an object; multiple files return an array. { "path": "document.pdf", "label": "pdf", "mime_type": "application/pdf", "score": 0.99, "group": "document", "description": "PDF document", "is_text": false }
FieldTypeDescriptionpathstringInput path (or - for stdin)labelstringDetected file type label (e.g., pdf, png, python)mime_typestringMIME type (e.g., application/pdf)scorefloatConfidence score (0.0–1.0)groupstringCategory (e.g., document, image, code)descriptionstringHuman-readable descriptionis_textboolWhether the file is text-based
CodeMeaning0All files detected successfully1Fatal error (no results produced)2Partial failure (some files failed, some succeeded)
Errors are printed to stderr. Common cases: File not found: error: path/to/file: No such file or directory Permission denied: error: path/to/file: Permission denied Not a regular file: error: path/to/dir: Not a regular file When processing multiple files, detection continues for remaining files even if some fail.
Default stdin mode (spool) writes stdin to a temporary file and uses Magika path detection. --stdin-mode head is best effort and may miss trailing-byte signatures. Very small files (< ~16 bytes) may produce low-confidence results Empty files are detected as empty Detection is content-based — file extensions are ignored
MITRE ATT&CK: Masquerading Proofpoint: Call It What You Want, Threat Actor Delivers Highly Targeted Multistage Polyglot
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.