DePIN
v1.0.0A comprehensive AI agent skill for navigating the Decentralized Physical Infrastructure Networks ecosystem. Explains DePIN projects and tokenomics, evaluates...
⭐ 0· 132·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description (DePIN analysis, tokenomics, tracking earnings) matches the SKILL.md content: an educational and analytical guide. The skill does not request unrelated credentials, binaries, or config paths.
Instruction Scope
The visible SKILL.md is a long, domain-specific guide on evaluating DePIN projects. It appears to be purely informational and does not instruct the agent to read system files, access secrets, or call external services. However the skill description mentions tracking earnings from hardware deployment — the document does not declare any automatic on-chain connectors or credentials, so any tracking would require the user to supply public addresses or upload data. Watch for any later prompts from the agent asking for private keys or to run external code; those would be outside the expected scope.
Install Mechanism
No install specification and no code files — the skill is instruction-only, which minimizes risk from downloaded code or new binaries.
Credentials
No required environment variables, credentials, or config paths are declared. Nothing in the SKILL.md indicates a need for secrets. This is proportionate to an informational/analysis skill.
Persistence & Privilege
The skill is not marked always:true and does not request elevated persistence. Autonomous invocation is allowed (platform default) but the skill does not ask for lasting system changes.
Assessment
This skill is instruction-only and appears to be an educational/analysis guide about DePIN. Risks are low in the current form because it requests no installs or credentials. Before installing or using: (1) do not share private keys or seed phrases — if the agent asks for wallet access, refuse or use read-only public addresses; (2) do not paste sensitive files or secrets into the chat; (3) if the agent asks you to run commands, install tools, or connect a wallet, review those requests carefully — they would expand the skill's footprint beyond the documentation; (4) note the skill source is unknown and has no homepage, so exercise the usual caution with provenance-sensitive workflows (signing transactions, automated deployments).Like a lobster shell, security has layers — review code before you run it.
blockchainvk97a41e2x6es9q29cm76zt98w9833sm7cryptovk97a41e2x6es9q29cm76zt98w9833sm7depinvk97a41e2x6es9q29cm76zt98w9833sm7infrastructurevk97a41e2x6es9q29cm76zt98w9833sm7latestvk97a41e2x6es9q29cm76zt98w9833sm7web3vk97a41e2x6es9q29cm76zt98w9833sm7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
