Chinese NLP Toolkit

v1.0.0

Specialized natural language processing for Chinese text. Covers segmentation (jiaba), sentiment analysis, keyword extraction, text summarization, tone detec...

0· 158·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (Chinese NLP: segmentation, sentiment, keywords, summarization, format conversion) match the SKILL.md content. The instructions describe algorithms and heuristics appropriate for these tasks and do not request unrelated resources.
Instruction Scope
SKILL.md stays on-topic: it provides step-by-step guidance for Chinese text processing, edge cases, and output formats. It does not instruct the agent to read system files, environment variables, or transmit data to external endpoints. Note: the skill is purely guidance (no implementation), so actual runtime behavior depends on any concrete implementation the agent or user builds from these instructions.
Install Mechanism
No install spec or code files are present. Nothing will be downloaded or written by the skill itself (lowest risk install profile).
Credentials
No required environment variables, credentials, or config paths are declared or referenced in the instructions. Requested privileges are proportional (none).
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or system configuration changes.
Assessment
This skill is an instruction-only guide for Chinese NLP and appears internally consistent and low-risk because it requests no installs or secrets. Important things to consider before using or implementing it: (1) There is no code here — if you or the agent installs libraries (jieba, pypinyin, zhconv, third-party sentiment APIs), make sure those packages come from trusted sources and review them before installing. (2) The skill will be used to process text; if that text is sensitive, confirm any implementation does not send data to external services you don't trust. (3) The skill owner/source is unknown and no homepage is provided — if you plan to use a packaged implementation labeled with this skill, inspect the implementation for network calls, credentials usage, or unexpected file I/O. (4) If you need production reliability (tokenization, NER, domain dictionaries), prefer vetted libraries and explicitly review their dependencies.

Like a lobster shell, security has layers — review code before you run it.

chinesevk979yb9vg0v0n98g5fm121vff183p0bzlatestvk979yb9vg0v0n98g5fm121vff183p0bznlpvk979yb9vg0v0n98g5fm121vff183p0bzpinyinvk979yb9vg0v0n98g5fm121vff183p0bzsegmentationvk979yb9vg0v0n98g5fm121vff183p0bzsentimentvk979yb9vg0v0n98g5fm121vff183p0bztext-analysisvk979yb9vg0v0n98g5fm121vff183p0bz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments