Weekly Review Pilot
v1.0.0汇总本周完成、阻塞、经验教训与下周计划,形成管理层版和执行版摘要。;use for weekly-review, planning, retrospective workflows;do not use for 杜撰完成项, 替代工时系统.
⭐ 0· 73·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (weekly review, retrospectives) align with what is included: a template, spec, examples, and a Python script that produces structured summaries and simple audits. Required binary is only python3, which is reasonable.
Instruction Scope
SKILL.md limits behavior to generating review drafts and dry-run audit output. It explicitly forbids fabricating completed items and changing external systems. The runtime instruction to run scripts/run.py or to use the template/spec when execution isn't available is coherent with the stated purpose.
Install Mechanism
No install spec or external downloads. The included scripts are run locally with python3 and use only standard library modules. There are no network fetches, archive extracts, or package installs in the repository.
Credentials
The skill requires no environment variables or credentials. The script will read local files (markdown, csv, code, etc.) when given a directory or file as input; this is consistent with its 'directory audit' and 'structured_brief' modes, but users should avoid pointing it at directories containing unrelated sensitive data.
Persistence & Privilege
The skill does not request persistent inclusion (always:false) and does not modify other skills or system-wide agent settings. It can be invoked by the agent (normal default) but has no elevated privileges.
Assessment
This skill appears coherent and low-risk: it only needs python3 and uses a local script plus templates to produce weekly-review summaries. Before installing or running it: (1) inspect scripts/run.py locally (no obfuscation or network calls are present), (2) do not point --input at home or root directories or repositories containing secrets (the script will read many text file types when given a directory), (3) run the provided smoke test (python3 scripts/run.py --input examples/example-input.md) in a sandboxed workspace, and (4) avoid supplying sensitive PII unless you sanitize inputs first. If you want extra assurance, run it in an isolated environment and grep the repo for 'http', 'requests', 'subprocess', or access to os.environ before trusting it with real data.Like a lobster shell, security has layers — review code before you run it.
latestvk97b906cnm57ddr1vp3h0b3gnx83e4z5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📅 Clawdis
OSmacOS · Linux · Windows
Binspython3
