crypt

by BytesAgain

Encrypt, decrypt, hash, and sign data using standard cryptographic algorithms. Use when you need data protection or integrity verification.

3.7k安全与合规未扫描2026年3月23日

安装

claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain3/crypt

文档

Crypt — Encryption & Decryption Tool

Crypt is a command-line cryptography toolkit that provides encryption, decryption, hashing, digital signing, key generation, encoding/decoding, and password generation. It uses Python's built-in hashlib, hmac, and other standard library modules.

Operation history is stored in ~/.crypt/data.jsonl (sensitive data like keys and plaintexts are NOT stored).

Prerequisites

  • Python 3.8+ with standard library
  • bash shell

Commands

encrypt

Encrypt text or file content using AES-like XOR cipher or other algorithms.

Environment Variables:

  • INPUT (required) — Text to encrypt, or file path if IS_FILE=true
  • KEY (required) — Encryption key/passphrase
  • ALGORITHM — Algorithm: aes-xor, caesar, vigenere, xor (default: aes-xor)
  • IS_FILE — Set to true for file input (default: false)
  • OUTPUT — Output file path (default: stdout)

Example:

bash
INPUT="Hello World" KEY="mysecret" bash scripts/script.sh encrypt

decrypt

Decrypt previously encrypted data.

Environment Variables:

  • INPUT (required) — Encrypted text or file path
  • KEY (required) — Decryption key/passphrase
  • ALGORITHM — Algorithm used for encryption (default: aes-xor)
  • IS_FILE — Set to true for file input (default: false)

hash

Generate cryptographic hash of text or file.

Environment Variables:

  • INPUT (required) — Text to hash, or file path if IS_FILE=true
  • ALGORITHM — Hash algorithm: md5, sha1, sha256, sha512, sha3_256 (default: sha256)
  • IS_FILE — Set to true for file input (default: false)

Example:

bash
INPUT="password123" ALGORITHM=sha256 bash scripts/script.sh hash

sign

Create an HMAC signature for data integrity verification.

Environment Variables:

  • INPUT (required) — Data to sign
  • KEY (required) — Signing key
  • ALGORITHM — Hash algorithm for HMAC (default: sha256)

verify

Verify an HMAC signature against data.

Environment Variables:

  • INPUT (required) — Original data
  • KEY (required) — Signing key
  • SIGNATURE (required) — Signature to verify
  • ALGORITHM — Hash algorithm (default: sha256)

keygen

Generate random keys or key pairs.

Environment Variables:

  • LENGTH — Key length in bytes (default: 32)
  • FORMAT — Output format: hex, base64, raw (default: hex)
  • TYPE — Key type: symmetric, pair (default: symmetric)

encode

Encode data using Base64, Base32, or hex encoding.

Environment Variables:

  • INPUT (required) — Data to encode
  • ENCODING — Encoding type: base64, base32, hex, url (default: base64)

decode

Decode Base64, Base32, hex, or URL-encoded data.

Environment Variables:

  • INPUT (required) — Data to decode
  • ENCODING — Encoding type: base64, base32, hex, url (default: base64)

password

Generate secure random passwords.

Environment Variables:

  • LENGTH — Password length (default: 16)
  • COUNT — Number of passwords to generate (default: 1)
  • CHARSET — Character set: all, alpha, alnum, hex, digits (default: all)
  • EXCLUDE — Characters to exclude

config

View or update configuration settings.

Environment Variables:

  • KEY — Configuration key
  • VALUE — Configuration value

help

Display usage information and available commands.

version

Display the current version of the crypt tool.

Data Storage

Operation logs are stored in ~/.crypt/data.jsonl. Each record contains:

  • id — Unique operation identifier
  • timestamp — ISO 8601 time
  • operation — Operation type (encrypt, hash, sign, etc.)
  • algorithm — Algorithm used
  • input_length — Length of input data (NOT the data itself)
  • output_preview — First 32 chars of output (for hashes/encoded data only)

Configuration

Config stored in ~/.crypt/config.json:

  • default_hash — Default hash algorithm (default: sha256)
  • default_encoding — Default encoding (default: base64)
  • password_length — Default password length (default: 16)
  • log_operations — Whether to log operations (default: true)

Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

相关 Skills

安全专家

by alirezarezvani

Universal
热门

覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。

安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。

安全与合规
未扫描9.0k

安全运营

by alirezarezvani

Universal
热门

覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。

应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。

安全与合规
未扫描9.0k

安全审计

by alirezarezvani

Universal
热门

安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议

把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。

安全与合规
未扫描9.0k

相关 MCP 服务

搜索和分析 Sentry 错误报告,辅助调试。

把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。

安全与合规
616

为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。

给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。

安全与合规
92

强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。

安全与合规
47

评论