valuemining-lengthybooks

v1.0.1

Extract actionable insights from methodology and skill-building books via a Four-Layer framework for concept mapping, case studies, SOPs, and critical analysis.

0· 69·0 current·0 all-time
byyaoo-2818@281862066-a11y
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (extracting actionable insights from methodology/skill-building books) match the SKILL.md content and the included reference document. The skill declares no binaries, env vars, or installs — which is appropriate for a document-driven extraction methodology.
Instruction Scope
The SKILL.md describes step-by-step extraction, case study and SOP templates, evaluation rubrics, and output formats. It does not instruct the agent to read arbitrary system files, access credentials, or phone home to unknown endpoints in the provided excerpts. The instructions assume access to book content provided by the user, which is reasonable for this purpose. Note: the files are truncated; if the remaining text includes explicit network calls or instructions to fetch copyrighted books from external mirrors, reassess.
Install Mechanism
No install spec and no code files are present. Being instruction-only means nothing is written to disk or downloaded at install time — lowest-risk modality.
Credentials
The skill requests no environment variables, credentials, or config paths. This is proportionate to a text-processing/extraction skill that only needs the user's book text and context.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request persistent/system-wide privileges. Autonomous invocation is allowed by default but is not combined with any broad privileges or credential access here.
Assessment
This skill is internally coherent and does not request sensitive system access. Before using it: (1) Provide the book text or relevant excerpts you want analyzed; avoid uploading copyrighted works you are not permitted to share — consider providing summaries or small excerpts instead. (2) Verify important claims and metrics produced by the skill against the original source — the methodology prompts structured outputs but the agent can hallucinate specifics. (3) If the SKILL.md contains any later sections (truncated here) that instruct network fetches or external uploads, review those lines carefully; they would change the risk profile. Otherwise, it appears safe to install and use for structured book analysis.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d572ar3pvp1s28jqm9d0f9n83r15k

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments