Customer Voice Synthesizer

v1.0.0

聚合客服、销售、评价与访谈中的用户原声,并按 JTBD/阶段组织。;use for customer-voice, jtbd, research workflows;do not use for 泄露用户隐私, 选择性忽略负面声音.

0· 147·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (聚合用户原声并按 JTBD/阶段组织) matches the included resources: a template, spec.json, examples, and a Python script that ingests files/directories and emits structured Markdown. Requiring only python3 is proportionate.
Instruction Scope
SKILL.md restricts behavior (do not leak PII, produce reviewable drafts) and directs running scripts/run.py or using the local template. The script accepts files or directories and will recursively read many text file types (md, txt, json, csv, py, js, sh, etc.); if given a broad or system path it can read arbitrary local files. This is expected for a directory-audit mode but is a privacy/footprint consideration: avoid passing root/system paths or sensitive directories unless you intend that scan.
Install Mechanism
No install spec; instruction-only plus a local Python script requiring only the standard library. Nothing is downloaded or extracted and no external package installs are declared.
Credentials
The skill requests no environment variables, no credentials, and no config paths. That aligns with its described offline/local processing purpose.
Persistence & Privilege
always:false and no persistent installation hooks. The skill can be invoked autonomously (platform default) and may run the local script if environment allows, which is expected given its purpose. There is no attempt to modify other skills or system-wide agent settings.
Assessment
This skill appears to do what it says: it locally ingests the files or directory you point it at and produces a structured brief. It does not require keys or network access. Main caution: the included script will read any files under the path you provide (including .py/.sh/.json/etc.), so do not pass broad system paths or directories containing secrets or sensitive data unless you want them scanned. Prefer feeding only the intended input files (or a sanitized copy), and run in a controlled environment. If you need automatic invocation, ensure the agent is restricted from selecting arbitrary filesystem paths.

Like a lobster shell, security has layers — review code before you run it.

latestvk9799qzw5yys5s9remhj1knq45831m7w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🗣️ Clawdis
OSmacOS · Linux · Windows
Binspython3

Comments