Faq Distiller
v1.0.0从客服对话、评论、工单或聊天记录中提炼 FAQ,并按用户阶段分类。;use for faq, support, knowledge workflows;do not use for 暴露用户隐私, 替代工单系统.
⭐ 0· 104·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, SKILL.md, resources/spec.json, template, examples, and scripts/run.py all consistently implement an offline FAQ-distillation / audit workflow. The only declared runtime requirement is python3, which the included script uses. No unrelated credentials, binaries, or unusual install steps are requested.
Instruction Scope
SKILL.md directs the agent to produce structured drafts and—when available—run the included script; the script operates on files, directories, or inline text and can scan many file types (.md, .py, .sh, .csv, etc.). This behavior is coherent for directory-audit use cases, but it means the script will read any path the user supplies (so passing system or sensitive directories could expose secrets). The SKILL.md does recommend desensitizing PII before input.
Install Mechanism
No install spec is provided (instruction-only skill with an included helper script). No remote downloads or package installs are declared. This is low-risk and proportionate for the functionality.
Credentials
The skill declares no required environment variables or credentials. The script does include heuristic patterns to detect 'secret-like' strings in files (for auditing), which is appropriate for an audit/reporting tool and does not itself request secrets.
Persistence & Privilege
The skill is not always-enabled and does not request elevated or persistent system presence. It does not modify other skills or system-wide settings; it only reads files the user points it at and can write an output file when asked.
Assessment
This bundle appears coherent and low-risk for its stated purpose. Before running: (1) review scripts/run.py yourself (it will read files you point it at); (2) do not pass system or home directories or any path containing secrets or PII—sanitize inputs first; (3) run the smoke test with the provided example-input.md to verify behavior; (4) run the script in a sandboxed environment if you need to scan third-party archives; and (5) if you plan to automate it, add policy checks to ensure it never runs against sensitive paths.Like a lobster shell, security has layers — review code before you run it.
latestvk97bqbqvwjn0jhdnvhebj1y8nd833jbb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
❓ Clawdis
OSmacOS · Linux · Windows
Binspython3
