Arrive Guideline Architect

v0.1.0

Generate ARRIVE 2.0 compliant animal research protocols with structured experimental design, sample size calculations, and reporting checklists. Ensures tran...

0· 166·0 current·0 all-time
byAIpoch@aipoch-ai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included documents and code: SKILL.md, ARRIVE checklist, example protocol, JSON brief, and a Python script implementing generation/validation. Required capabilities (protocol generation, sample-size calc, validation) are supported by the provided files.
Instruction Scope
Runtime instructions and examples invoke local Python scripts (e.g., python scripts/validate.py, builder.generate_protocol). They operate on local files and produce checklists/reports. The instructions do not direct the agent to read unrelated system files, call external endpoints, or exfiltrate data.
Install Mechanism
No install spec is provided (instruction-only plus included scripts). Nothing is downloaded from external URLs or installed automatically, so no high-risk install behavior was detected.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. The functionality (local protocol generation/validation) does not appear to require additional secrets or cloud credentials.
Persistence & Privilege
The skill is not flagged always:true and does not request system-wide configuration changes. It runs as local scripts and produces files; no evidence it modifies other skills or requests persistent elevated privileges.
Assessment
This package looks coherent for its stated purpose, but the source is unknown — before installing or running: 1) inspect scripts/main.py (and any other .py files) for network calls, subprocess usage, or code that reads unexpected system files; 2) run it in an isolated/sandbox environment if possible; 3) confirm institutional/ethics approval before using outputs to design or submit animal experiments; and 4) prefer tools from known publishers or check for a homepage/repository to verify provenance and updates.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e814q24n4cc8nyyntj8tyy582tt30

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments