research-matrix-builder

v1.0.0

Build literature matrices from papers, notes, and abstracts to compare methods, data, findings, and research gaps.

0· 186·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the actual behavior: it normalizes records and outputs a CSV matrix. Required binary is only python3 and the bundled resource is a schema used by the workflow — all proportional to the stated purpose.
Instruction Scope
SKILL.md confines operations to normalizing inputs, producing CSV and a narrative. It references only the local script and resource and instructs preview-first behavior. It does not direct reading unrelated system files or exfiltrating data.
Install Mechanism
No install spec — instruction-only with a small local script. No downloads, no brew/npm installs, no remote URLs or extract steps. Helper script is plaintext and auditable.
Credentials
No environment variables, credentials, or config paths are requested. The single runtime dependency (python3) is appropriate for the included script.
Persistence & Privilege
Skill is not force-included (always:false) and does not request elevated or persistent privileges or modify other skills. Autonomous invocation is allowed by platform default but not unusual here.
Assessment
This skill appears coherent and low-risk: the included Python helper simply converts a user-supplied JSON list to a CSV using the provided schema. Before installing, (1) review the small script yourself to confirm it matches expectations (it's short and readable), (2) only provide non-sensitive sample data to test outputs, and (3) remember that platform agents and models may see the data you pass to the skill—avoid sending confidential material unless you trust the execution environment. If you need stricter guarantees, run the script locally yourself with your data rather than invoking it via an automated agent.

Like a lobster shell, security has layers — review code before you run it.

latestvk97be90sjpm0tywj6zsv2vnb8n82vted

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🧰 Clawdis
Binspython3

Comments