Nm Imbue Catchup
v1.0.0Summarize recent changes from git history for context recovery, handoffs, and sprint review
⭐ 0· 50·1 current·1 all-time
by@athola
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (git catchup/context recovery) match the SKILL.md and module contents. The instructions focus on git, documents, and logs and reference complementary plugins (sanctum, leyline, imbue modules) to gather data — these integrations are plausible for the stated purpose.
Instruction Scope
Runtime instructions and modules explicitly describe running git, grep, awk and related commands to enumerate changes, logs, and meeting notes. They do not instruct reading unrelated system secrets, contacting external endpoints, or exfiltrating data. Note: the skill expects to inspect the user's repository and log files when invoked, which is appropriate for a catchup tool.
Install Mechanism
No install spec and no code files — instruction-only. This is the lowest-risk installation model (nothing written to disk by the skill).
Credentials
The skill requests no environment variables or credentials. It does declare a required config path 'night-market.imbue:proof-of-work' (metadata.requires/config). That config key is not explained in the SKILL.md; it may be benign (e.g., reproducibility/proof metadata) but is opaque — the user should verify what that config contains and that it is not a secret before enabling the skill.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent system-wide modifications or elevated privileges in the instructions. Autonomous invocation is allowed (platform default) but not combined with any other concerning factors.
Assessment
This skill is instruction-only and appears to do what it says: run git/log/document inspection commands to summarize recent changes. Before installing, confirm what the 'night-market.imbue:proof-of-work' config key contains (ensure it is not a secret or external credential). Also be aware that using the skill will run repository and log inspection commands in your workspace — only invoke it in repositories and environments you intend the agent to read. If you rely on other plugins it references (sanctum, leyline, sem), check their permissions and configs separately.Like a lobster shell, security has layers — review code before you run it.
latestvk97bxzeb9zbsebzsqty3464q0s84pkrb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🦞 Clawdis
Confignight-market.imbue:proof-of-work
