Yasal Defterler Tr
v1.0.0Türkiye'de şirketlerin tutması zorunlu yasal defterler, e-defter uygulaması, defter tasdik tarihleri, belge arşivleme kuralları, personel özlük dosyaları, ça...
⭐ 0· 76·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description and bundled reference files all describe the same subject (Turkish legal books, e-defter, archiving, employee documentation). The skill asks for no unrelated binaries, env vars, or permissions — proportional to an informational reference.
Instruction Scope
SKILL.md directs the agent to three local reference files and to use the skill for questions about legal defterler and employee documents. It does not instruct reading unrelated system files, contacting external endpoints, or exfiltrating data. Note: the content is informational and not a substitute for legal counsel; some legal statements (e.g., '2025 itibarıyla zorunlu') may become outdated and should be verified against official sources.
Install Mechanism
No install spec and no code files; this is instruction-only so nothing is downloaded or written to disk during installation.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate access requested.
Persistence & Privilege
always:false and user-invocable:true (defaults). The skill does not request persistent system privileges or modify other skills' configurations.
Assessment
This skill is an offline reference bundle and appears coherent with its stated purpose. Before installing, consider: 1) Accuracy: confirm critical legal claims (dates, mandatory rules) against official sources (GİB, TTK, VUK) or a lawyer — the skill is informational, not legal advice. 2) Sensitive data: the skill itself does not request files or credentials, but don’t upload employee PII or confidential documents to the agent unless you trust how those inputs will be handled. 3) Source verification: the files cite 'Tech Consulting (techsmmm.com)'; if provenance matters, verify the publisher and look for up-to-date citations. If you want automated analysis of your company documents, expect additional permissions/requests from the agent and reassess at that time.Like a lobster shell, security has layers — review code before you run it.
latestvk97fqh705fx7vftvbqx4r0y1j183shm2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
