Nm Conserve Token Conservation

v1.0.0

Enforce token quota management at session start with conservation rules, delegation checks, and compression review

0· 52·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (token quota management) match the SKILL.md: the workflow describes quota checks, read budgets, compression, delegation, and logging — all coherent with a conservation helper.
Instruction Scope
Instructions ask the agent to read session status, notebooks, files and PDFs and to use tools (Read, Grep, message selector, /new, /compact) and optionally delegate to other tooling. This is appropriate for token-conservation, but these reads could access sensitive files or session metadata — the skill does not request credentials but does rely on platform file/status access and on user approval to exceed budgets.
Install Mechanism
Instruction-only skill with no install spec or downloaded code — lowest installation risk.
Credentials
No environment variables, credentials, or config paths are requested, which is proportionate to the stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes or access to other skills' configs; autonomous invocation is allowed by default but not combined with other red flags here.
Assessment
This skill appears coherent and low-risk because it asks for no secrets and installs nothing. Before enabling it, confirm you are comfortable with the platform-level file/session access it expects (it will read /status, notebooks, and selected files). Also check how delegation is handled: when it suggests sending work to other tools (e.g., qwen-delegation) verify those tools' permissions and endpoints so sensitive data isn't forwarded unexpectedly. Finally, ensure the agent enforces the 'ask user before exceeding read budget' behavior if you want to prevent automatic extra reads.

Like a lobster shell, security has layers — review code before you run it.

latestvk978re2zqwvf3rjg0nc2jbaggh84phcm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🦞 Clawdis

Comments