Knowledge Management System

v1.0.0

Organize, document, and maintain critical organizational knowledge with audits, taxonomy, templates, and risk management to preserve expertise and improve fi...

0· 1k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the SKILL.md and README: both provide audit steps, taxonomy, templates, and workflows for KM. There are no unexpected dependencies, binaries, or credentials requested that would be unrelated to a knowledge-management methodology.
Instruction Scope
The runtime instructions are templates and interview guides for extracting and documenting knowledge. They reasonably ask interviewers to ask about 'tools & access' and to record/process knowledge. This is in-scope for KM, but it also creates a potential operational risk if people capture or store sensitive credentials or PII in documentation—nothing in the skill's instructions automatically exfiltrates data or instructs the agent to read system files, but operators should avoid saving secrets in KB pages and get consent for recordings.
Install Mechanism
No install spec and no code files — the skill is instruction-only. That is the lowest-risk installation model and is proportional to a methodology/template skill.
Credentials
The skill requires no environment variables, no primary credential, and no config paths. The README mentions third-party paid 'context packs' behind external links, but those are optional commercial add-ons and not required by the skill itself.
Persistence & Privilege
The skill does not request 'always' presence and uses default invocation settings. As an instruction-only skill it does not modify other skills or system settings; no elevated or persistent privileges are requested.
Assessment
This skill is a methodology/template pack and is internally consistent, but take these precautions before installing and using it: - Do not store credentials or other secrets in knowledge pages or runbooks; replace any sensitive values with redacted placeholders and reference secure vaults instead. - Get informed consent before recording interviews; follow your org's privacy policy for recordings and PII. - The skill has no code and no automatic network behavior, but README links point to external commercial packs — verify the vendor and links before following or paying for them. - Because the skill source/homepage is not clearly documented (owner ID only), consider testing it in a controlled environment and review the SKILL.md and README yourself before sharing outputs broadly. - If you plan to operationalize dashboards or automated review schedules mentioned in the docs, implement them with your own vetted tooling rather than relying on implicit automation from this instruction-only skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk972t6py413tms3xf2q3vee0bs81f839

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments