ANDG
v1.0.1Analyze resumes for target roles, identify weak bullets, missing keywords, ATS gaps, and provide actionable rewrite suggestions.
⭐ 0· 245·1 current·1 all-time
byAndrew@andrewgufx
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (resume analysis, ATS gaps, rewrite suggestions) matches the SKILL.md instructions. The skill only needs resume text, target role/company/region inputs (as described) and does not request unrelated binaries, credentials, or system access.
Instruction Scope
SKILL.md contains detailed, bounded instructions for analyzing resume text, identifying weak bullets, ATS gaps, and producing rewrites in a fixed JSON-like output. It does not instruct the agent to read arbitrary files, environment variables, system state, or transmit data to external endpoints. It allows inferring missing role context, which is reasonable for this domain.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be written to disk or downloaded during install, minimizing supply-chain risk.
Credentials
The skill declares no required env vars, credentials, or config paths. The instructions only ask for user-provided resume text and role context, which is proportionate to the stated function.
Persistence & Privilege
always:false (not force-included). user-invocable:true and disable-model-invocation:false are normal for skills. There is no code that would modify other skills or system settings.
Assessment
This skill appears coherent and low-risk: it only contains instructions for reviewing resume text and requests no credentials or installs. Before using, avoid pasting highly sensitive personal data (full SSN, passport numbers, or confidential employer data) into the resume text you provide. Treat rewritten claims carefully — confirm factual accuracy and don't invent metrics. If the skill is later updated to include an install step or environment variables, re-check the new spec before enabling it. Finally, remember its ATS advice is heuristic; for critical applications, cross-check with a real recruiter or an official ATS preview tool.Like a lobster shell, security has layers — review code before you run it.
latestvk9734xnma750rg1dg9w0ed995x82fqcn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📄 Clawdis
