knowledge-forge
v1.0.0Transform raw personal experience, case studies, business documents, or draft content into transferable cognitive assets -- structured knowledge that others...
⭐ 1· 320·5 current·5 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (turning experience into teachable assets) match the SKILL.md and reference materials. The skill requests no binaries, env vars, or config paths and contains only instruction and reference docs — nothing extraneous or unrelated is required.
Instruction Scope
SKILL.md contains a self-contained 4-step conversion engine and output templates. It does not instruct the agent to read system files, environment variables, or external endpoints, nor to exfiltrate data. All actions are textual transformations of the user's supplied material.
Install Mechanism
No install spec or code files beyond documentation; nothing will be downloaded or written to disk by the skill itself. This is low-risk from an installation perspective.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate to the described functionality (pure content transformation).
Persistence & Privilege
always is false and the skill does not request or modify agent/system-wide settings. It can be invoked by the model (normal default), but there is no indication of privileged or persistent behavior.
Assessment
This skill appears internally consistent and safe in terms of system access. Before using it, avoid pasting secrets, personal identifiers, or confidential attachments into the input (the skill transforms whatever you supply). Note the skill's source/homepage are not provided — if provenance matters, ask the publisher for more information. Also remember that, like any skill that sends user content to the model, transformed outputs may be stored in conversation logs depending on your platform's data retention policies; confirm privacy/retention settings if you need strict confidentiality.Like a lobster shell, security has layers — review code before you run it.
latestvk9722tef1ktmr55cwtrty8xzex82es5k
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
