Everything Windows 文件搜索技能 — HTTP API 快速搜索、中英文模糊匹配、文件类型过滤
Security Analysis
high confidenceThe skill is internally coherent: it implements a local client/diagnostic toolkit for the Everything HTTP Server, requires no external credentials, and its files and runtime instructions match the stated purpose.
Name/description (Everything Windows HTTP API search) align with code, examples, and docs. The package only contains client code, diagnostics, and examples that talk to localhost:2853 (Everything). No unrelated services, credentials, or unexpected binaries are requested.
SKILL.md and scripts instruct the agent to check local Everything process, test 127.0.0.1:2853 endpoints, read the user's Everything.ini from %APPDATA% to validate configuration, and run local subprocesses (tasklist). Those actions are within the stated diagnostics/search scope and are documented in the README and docs.
This is instruction/code-only with no install spec. requirements.txt lists only standard library (optional requests/pytest commented). Nothing is downloaded from external or untrusted URLs by the skill itself.
No required environment variables, no credentials, and no config paths outside Everything's known config locations are requested. Reading %APPDATA%\Everything\Everything.ini is justified by the purpose (diagnosing Everything's HTTP server settings).
Skill is not always-enabled, does not attempt to modify other skills or system-wide agent settings, and contains only client/diagnostic scripts that run on demand.
Guidance
This skill appears to do what it says: local-only queries and diagnostics for the Everything HTTP Server. Before installing: (1) confirm you trust the publisher because the package will run local subprocesses (tasklist) and read Everything.ini from your user profile (this is necessary to check config); (2) the skill only contacts 127.0.0.1:2853 (Everything) — do not enable 'Allow remote access' in Everything unless you understand the network risk; (3) review the included scripts (check-config.py, diagnose.py, examples) if you want to audit runtime behavior; (4) because the package is not from a known homepage, prefer running the examples in a sandbox or inspecting source files yourself before granting execution in an automated agent.
Latest Release
v1.0.0
Initial release — Everything HTTP API integration for fast Windows file search with Chinese/English support
Popular Skills
Published by @steve-shi-web on ClawHub