Whistleblower Ethics Hotline
v1.0.0Confidential whistleblower system supporting anonymous intake, triage, investigations, regulatory compliance, retaliation prevention, and board reporting tem...
⭐ 0· 422·0 current·0 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md and README: guidance for anonymous intake, triage, investigations, compliance, and policy generation. There are no unexpected requirements (no env vars, binaries, or installs) that conflict with the stated purpose.
Instruction Scope
Runtime instructions are limited to procedural guidance (intake design, triage, investigation protocol, jurisdictional rules, templates). They do not instruct the agent to read local files, access environment variables, or transmit data to hidden endpoints. Recommending third-party platforms and including jurisdiction-specific callouts is reasonable for this use case.
Install Mechanism
No install spec or code files are included; this is instruction-only, which minimizes on-disk execution risk.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate for a policy/guidance pack that generates documents and checklists.
Persistence & Privilege
always is false and there is no request for permanent presence or modification of other skills or system settings. The skill can be invoked by the agent (default), which is expected for a user-invokable guidance pack.
Assessment
This skill is instruction-only and coherent with its stated purpose, but before installing: (1) verify any third-party platform recommendations for privacy/security and contract terms, (2) review jurisdiction-specific legal claims with counsel (the SKILL.md summarizes laws but is not a substitute for legal advice), (3) when generating policies/templates, avoid pasting real PII or internal secrets into prompts, and (4) if you plan to implement an intake channel, ensure technical designs actually preserve anonymity (log scrubbing, metadata handling) and are tested by your security/privacy teams.Like a lobster shell, security has layers — review code before you run it.
compliancevk978mp49tw1ngcgf6jvwpz34es81mf0nethicsvk978mp49tw1ngcgf6jvwpz34es81mf0nlatestvk978mp49tw1ngcgf6jvwpz34es81mf0nreportingvk978mp49tw1ngcgf6jvwpz34es81mf0nwhistleblowervk978mp49tw1ngcgf6jvwpz34es81mf0n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
