Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
GitHub repository trust scoring and due diligence. Use when asked to analyze, audit, score, or evaluate any GitHub repo — especially for crypto/DeFi project...
GitHub repository trust scoring and due diligence. Use when asked to analyze, audit, score, or evaluate any GitHub repo — especially for crypto/DeFi project...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Zero-dependency GitHub trust scorer. Runs 29 analysis modules across 12 scoring categories.
# Single repo node scripts/analyze.js <owner/repo or github-url> [flags] # From a tweet (auto-extracts GitHub links) node scripts/analyze.js <x.com-or-twitter.com-url> [flags] # Batch mode node scripts/analyze.js --file <repos.txt> [--json]
--json — JSON output (for pipelines) --oneline — compact one-line score --badge — shields.io markdown badge --verbose — show progress --token <pat> — GitHub PAT (or set GITHUB_TOKEN env) --file <path> — batch mode, one repo per line (# comments ok)
CRITICAL: Always run with GITHUB_TOKEN loaded. Without it, scores are severely degraded (missing stars, forks, commits). Before running: source ~/.bashrc (token is in ~/.bashrc as GITHUB_TOKEN). Or pass explicitly: GITHUB_TOKEN="$(grep GITHUB_TOKEN ~/.bashrc | cut -d'"' -f2)" node scripts/analyze.js ...
CategoryMaxWhat it checksCommit Health20Human vs bot, GPG sigs, code dumps, fake timestampsContributors15Bus factor, contributor diversityCode Quality25Tests, CI, license, docs, lock filesAI Authenticity15AI slop detection in code/READMESocial10Stars, forks, star/fork ratio, botted starsActivity10Recent pushes, releasesCrypto Safety5Token mints, rug patterns, wallet addressesDependency Audit10Known malicious packages, typosquatting, install hooks, lock filesFork Quality8Fork divergence, suspicious changes, gutted vs meaningful forksREADME Quality10Install guide, examples, structure, API docsMaintainability10File sizes, nesting, code/doc ratioProject Health10Abandoned detection, velocity, issue response, PR reviewOriginality5Copy-paste, template detection, backer verificationAgent Safety15Install hooks, prompt injection, secrets, CI audit, permissions
A (85+): LEGIT B (70-84): SOLID C (55-69): MIXED D (40-54): SKETCHY F (<40): AVOID
Enhanced dependency audit: Detects known malicious packages (event-stream, ua-parser-js, etc.), typosquatting attacks, install hooks, and estimates transitive dependency bloat Fork comparison: Analyzes fork divergence, detects cosmetic vs meaningful changes, flags suspicious modifications (removed CI, added wallets), identifies gutted forks Agent safety: Detects prompt injection, credential harvesting, install script hooks, obfuscated code Secrets detection: Finds hardcoded API keys, tokens, private keys via regex + entropy Network mapping: Categorizes all outbound domains (API, CDN, unknown) CI/CD audit: Checks GitHub Actions for pull_request_target, unpinned actions, secret leaks Permissions manifest: Summarizes what the code needs to run (like an app permissions list) Author reputation: Org memberships, suspicious repos, account age Backer verification: Cross-references investor claims vs committer org membership Complexity hotspots: Flags large files with deep nesting and high conditional density
# One repo per line, # for comments Uniswap/v3-core https://github.com/aave/aave-v3-core OpenZeppelin/openzeppelin-contracts
Default: rich terminal report with bar charts, sections, verdict. --json: Full structured data for programmatic use. --oneline: RepoName: 85/100 [A] — 2 flags
Keep it concise. Lead with score/grade and notable findings. Skip sections with nothing interesting. Example: "Uniswap/v3-core scored 75/B — 96% GPG-signed, 11 authors, MIT license. Flagged: abandoned (466 days no push), 2,597 transitive deps (bloated), secrets in CI run commands. Agent safety: CAUTION."
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.