BioFlow
v1.0.0Concise guide for BioFlow API usage covering signup/login, file upload/download, token balance check, task submission, and result retrieval with example endp...
⭐ 0· 136·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (BioFlow API quickstart) match the packaged content: internal reference docs and a guide for signup/login, upload, job submission, polling, and downloading results. Nothing in the package requests unrelated services or credentials.
Instruction Scope
SKILL.md instructs the agent to read the provided reference files and produce concise endpoint examples. It references only the included docs and the API base URL placeholder; it does not instruct reading system files, unrelated env vars, or exfiltrating data. It asks for 'executable' examples assuming a Bearer token, which is consistent with an API quickstart.
Install Mechanism
There is no install spec and no code files — the skill is instruction-only, so nothing is downloaded or written to disk.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. The API flow describes obtaining access/refresh tokens as part of normal use; that is proportional to the documented API usage.
Persistence & Privilege
always:false and default model invocation are used. The skill does not request persistent presence or modify other skills or system settings.
Assessment
This package is documentation-only and appears coherent with its stated purpose. Before using it: (1) verify the real API base URL/host before sending credentials or datasets; (2) do not supply real Bearer tokens, passwords, or personal data to the agent unless you trust the runtime and target service; (3) be aware that following the guide will create accounts and may send SMS messages or upload data to an external service — review privacy/charges for that service; and (4) because the skill can be invoked by the agent, avoid granting it credentials or permission to perform network calls autonomously unless you intend it to act on your behalf.Like a lobster shell, security has layers — review code before you run it.
latestvk97c7s951nd17nhx8j31wc5bb1833qp9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
