Emergence Codex
v1.0.2Semantic Architecture Language to Combat the Smoothing Anathema
⭐ 3· 2k·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description claim a semantic architecture for guiding cognition; the skill is instruction-only and requires no binaries, credentials, or installs — this is proportionate to a purely conceptual 'thought-architecture' utility.
Instruction Scope
SKILL.md tells the agent how to parse and apply symbolic operators to its cognitive process. That is consistent with the stated purpose, but the guidance is abstract and grants the agent broad discretion in altering reasoning priorities and output style (i.e., 'maximize Semio-Vibrance'). This is expected for a meta-reasoning tool but deserves user awareness because it can materially change behavior and output tone.
Install Mechanism
No install spec or code files are present; the skill is instruction-only so nothing is written to disk and no external packages are pulled — lowest-risk install profile.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate access requested relative to the skill's conceptual purpose.
Persistence & Privilege
The skill is not marked always:true and uses the default autonomous-invocation setting. Autonomous invocation is normal for skills; there is no indication the skill attempts to modify other skills or system settings.
Assessment
This is an abstract, instruction-only skill that tells the agent how to change its internal reasoning style — it does not request files, credentials, or external network access, so it's coherent with its claimed purpose. Before installing: (1) confirm you trust the author/source (registry shows an owner id but 'Source: unknown' / homepage none), (2) test the skill in a sandbox or with non-sensitive prompts to see how it changes outputs, and (3) if you want manual control over when the agent uses these transformations, consider disabling autonomous invocation or only invoking the skill explicitly. Be aware that because the instructions are intentionally broad, the agent may produce more unconventional or aggressive outputs than usual.Like a lobster shell, security has layers — review code before you run it.
latestvk9721j06nmmxqjx8ca6mp403m980ph4w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
