Nm Abstract Methodology Curator
v1.8.3Surface expert frameworks and methodologies
⭐ 0· 126·1 current·1 all-time
by@athola
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the included modules (instruction design, code review, testing, debugging, decision making, knowledge management). There are no unexpected requirements (no env vars, binaries, or install steps) that would be disproportionate to a curation skill.
Instruction Scope
SKILL.md directs the agent to consult the bundled domain modules and to use the content to select or document methodologies. It does not instruct reading unrelated system files, accessing credentials, or contacting external endpoints (other than an optional link to the upstream repo for more functionality).
Install Mechanism
No install specification or code files are present—this is instruction-only. Nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The content reasonably requires no secrets or external API access.
Persistence & Privilege
Flags show default behavior (always: false, model invocation allowed). The skill does not request persistent elevated presence or modify other skills/configurations.
Assessment
This skill is an offline, instruction-only curator of methodologies and appears internally consistent and low-risk: it doesn't ask for secrets, install code, or call external endpoints. If you plan to install additional Night Market/Claude plugins referenced in the README (e.g., the Claude Code plugin) review those plugins separately—they may have different install or credential requirements. Also verify licenses and upstream sources if you need to republish or redistribute any curated materials.Like a lobster shell, security has layers — review code before you run it.
latestvk978cp7pxxbpr46qfwy6vqvzvs84jmgc
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧠 Clawdis
