Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Provides utilities for safe file handling, JSON/YAML editing, regex text processing, system commands, encoding, date/time, and validation tasks.
Provides utilities for safe file handling, JSON/YAML editing, regex text processing, system commands, encoding, date/time, and validation tasks.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
A collection of practical utilities for everyday agent operations.
Always use trash instead of rm when possible: trash /path/to/file # Safer deletion (recoverable)
# Rename files with pattern for f in *.txt; do mv "$f" "${f/.txt/.md}"; done # Find and delete files older than 7 days find . -name "*.log" -mtime +7 -exec trash {} \; # Copy with progress rsync -av --progress src/ dest/
# Pretty print jq '.' file.json # Extract field jq '.field' file.json # Update field jq '.field = "new_value"' file.json > tmp && mv tmp file.json # Merge JSON files jq -s 'add' file1.json file2.json
# Read value yq '.key' file.yaml # Update value yq '.key = "value"' -i file.yaml # Convert YAML to JSON yq -o=json '.' file.yaml
# Search and replace in files sed -i '' 's/old/new/g' file.txt # Extract matches grep -oP 'pattern' file.txt # Count occurrences grep -c 'pattern' file.txt # Remove duplicate lines sort file.txt | uniq > deduplicated.txt # Extract column awk '{print $2}' file.txt
# Find process by name ps aux | grep process_name # Kill by port lsof -ti:3000 | xargs kill -9 # Monitor resource usage htop
# Check port availability lsof -i :PORT # Download with retry curl --retry 3 -O URL # Test endpoint curl -X POST -H "Content-Type: application/json" -d '{"key":"value"}' URL
# Base64 encode/decode echo "text" | base64 echo "dGV4dAo=" | base64 -d # URL encode/decode python3 -c "import urllib.parse; print(urllib.parse.quote('text'))" python3 -c "import urllib.parse; print(urllib.parse.unquote('text%20here'))" # JSON escape/unescape jq -R . <<< 'string to escape' jq -r . <<< '"escaped string"'
# Current timestamp date +%s # ISO format date -u +"%Y-%m-%dT%H:%M:%SZ" # Convert timestamp date -r 1234567890 # Timezone conversion TZ="America/Chicago" date
# Validate JSON jq empty file.json && echo "Valid JSON" # Validate YAML python3 -c "import yaml; yaml.safe_load(open('file.yaml'))" && echo "Valid YAML" # Check JSON schema check-jsonschema --schemafile schema.json document.json
TaskCommandSafe deletetrash fileFind filesfind . -name "*.ext"Search in filesgrep -r "pattern" .Replace textsed -i '' 's/old/new/g'JSON prettyjq '.'YAML readyq '.key'Port checklsof -i :PORTBase64 decodebase64 -d
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.