mac-cleanup
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill consists of a README, SKILL.md, _meta.json, and a Python script (scripts/cleanup.py). No prompt injection, data exfiltration, obfuscation, privilege escalation, or persistence mechanisms were detected across any of the files. The Python script uses only standard library modules (os, shutil, time, argparse, datetime) and does not introduce any unverifiable external dependencies. It operates exclusively on user-owned directories (~/.Trash, ~/Library/Caches, ~/Downloads) and does not attempt to modify system files or escalate privileges. A critical safety feature is the default 'dry-run' mode, which prevents accidental data loss; actual deletion only occurs if the user explicitly provides the '--force' argument. The README also includes a 'Security Note' advising users to review the cleanup.py script before using the '--force' option, demonstrating good transparency. The reference to a GitHub commit in _meta.json (https://github.com/openclaw/skills/commit/...) is to a trusted source (the OpenClaw platform's own skills repository) and is purely informational, not a security risk. Overall, the skill is well-behaved and implements its functionality with appropriate safety measures.