Robotics VLA
v1.1.0Expert guidance for Vision-Language-Action (VLA) robot foundation models — covering architecture design, training pipelines, data strategy, deployment, and e...
⭐ 1· 93·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name and description match the included SKILL.md and reference documents: architecture, training, embodiments, and related work for a VLA (π0) style robot model. No unrelated binaries, credentials, or config paths are requested.
Instruction Scope
Runtime instructions are purely advisory (design/training/evaluation guidance) and only reference bundled docs. There are no instructions to read system files, environment variables, network endpoints, or to perform actions outside the documentation scope.
Install Mechanism
No install specification or code files are present—this is instruction-only material, so nothing is downloaded or written to disk by an installer.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no extra secret-like variables requested that would be disproportionate to its stated purpose.
Persistence & Privilege
The skill does not request always:true and is user-invocable with normal autonomy settings. It does not attempt to modify other skills or system settings; no persistence or elevated privileges are requested.
Assessment
This skill is a documentation bundle offering technical guidance for building and training VLA robot models; it does not request credentials or install code and appears internally consistent. However, the source is unknown and claims (model sizes, datasets, performance) are not independently verifiable from the package — treat the content as expert guidance, not a tested implementation. Before using any recommendations in production or on hardware: (1) verify provenance of referenced models/data, (2) cross-check the training/operation details against primary literature or open-source implementations, and (3) perform safety testing in simulation to avoid risking real robots. If you need higher assurance, ask the publisher for provenance, training logs, or reproducible scripts.Like a lobster shell, security has layers — review code before you run it.
latestvk9772kr0btfbnvaq23mbd23jeh83rjqm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
