Human Writing
v1.1.0Guidelines and standards for professional, human-like writing and documentation. Use this skill when generating READMEs, technical documentation, code commen...
⭐ 0· 345·1 current·1 all-time
byazzar budiyanto@1999azzar
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (human-like writing guidance) align with the included SKILL.md and two reference documents; nothing in the package requires unrelated capabilities or credentials.
Instruction Scope
Runtime instructions are limited to consulting the bundled reference files, drafting text, and self-auditing for stylistic 'tells'. The skill does not instruct the agent to read arbitrary user files, access environment variables, or transmit data externally.
Install Mechanism
There is no install spec and no code files. As instruction-only content, it writes nothing to disk and does not pull external code or archives.
Credentials
No environment variables, credentials, or config paths are requested; the guidance uses only local bundled reference files, which is proportionate to the stated purpose.
Persistence & Privilege
always is false and the skill does not request special privileges or system-wide changes. Autonomous invocation is allowed by default but is reasonable for a stylistic guidance skill.
Assessment
This skill is an instruction-only style guide and appears internally consistent and low-risk. If you install it, expect the agent to automatically apply these stylistic rules when asked to produce documentation — review outputs to ensure the rules don't remove phrasing you want preserved. Because the skill bundles its reference files and requests no credentials or installs, there is no network or credential exposure from the skill itself. If you have organizational style rules or need different tone choices for some outputs, keep that in mind and test the skill on representative prompts before wide use.Like a lobster shell, security has layers — review code before you run it.
documentationvk97a0dp2xrh1ce5a06hpxxaf6582307wlatestvk97a0dp2xrh1ce5a06hpxxaf6582307wprofessionalvk97a0dp2xrh1ce5a06hpxxaf6582307wwritingvk97a0dp2xrh1ce5a06hpxxaf6582307w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
