Handover Memory Pack
v1.0.0为人员离岗或项目交接整理显性与隐性知识,减少信息流失。;use for handover, knowledge-transfer, memory workflows;do not use for 泄露不该交接的密钥, 省略高风险事项.
⭐ 0· 99·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description, SKILL.md, README, resources, and the included Python script all align: the skill organizes handover material, produces structured Markdown, and optionally audits directories or CSVs. Declared requirement (python3) is appropriate and minimal.
Instruction Scope
SKILL.md stays on-topic and warns about not including secrets and not performing high-risk actions. The included script can read arbitrary files and directories (many text file extensions) when invoked with a directory or file path, and it will scan contents for patterns (including secret-like patterns). This is expected for an audit/reporting tool but means users must avoid pointing it at sensitive directories or untrusted paths.
Install Mechanism
No install spec; this is an instruction-only skill with an included Python script. No external downloads, package installs, or obscure installers are present.
Credentials
No environment variables or credentials are requested. The skill operates on user-provided inputs and local resources only, which is proportionate to its purpose.
Persistence & Privilege
always is false and the skill does not request persistent elevated privileges or modify other skills. Model invocation is allowed (platform default); nothing in the skill implies it requires forced inclusion or system-wide changes.
Assessment
This skill appears to do what it claims, but take normal precautions: (1) review the included scripts before running; (2) run the script in a sandboxed environment if you plan to point it at directories (do not pass /, your home, or other sensitive paths); (3) avoid giving it files containing secrets or credentials — the tool will scan for "secret-like" patterns and could include masked findings in outputs; (4) prefer using the template/spec-driven mode (passing sanitized text) rather than directory scans when handling sensitive handovers; and (5) use --dry-run and inspect outputs before any automated write/send actions.Like a lobster shell, security has layers — review code before you run it.
latestvk97ee8y5f5a5s6e0wvwrdphjmn833m7n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧠 Clawdis
OSmacOS · Linux · Windows
Binspython3
