Writing Assistant Basil Repo

v1.0.0

Manage specialized writers by analyzing writing tasks, creating content strategies with references or detailed guidance, and assigning tasks via MCP tools.

0· 39·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md instructions: both describe analyzing writing tasks, creating strategies, and assigning work via MCP tools. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
Instructions are concise and stay within the stated purpose, but are somewhat vague about what 'assign to the appropriate tool' and 'MCP tools' mean. That open-endedness could cause the agent to call other tools/skills if available; the skill itself does not declare or constrain which tools to use.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is written to disk or downloaded during install.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no unnecessary access to secrets or unrelated services.
Persistence & Privilege
always is false and autonomous invocation is allowed (platform default). The skill does not request permanent presence or system-level changes.
Assessment
This skill appears coherent and low-risk because it only contains runtime instructions and requests no credentials or installs. Two practical cautions: (1) the instructions are vague about which 'MCP tools' to assign tasks to — confirm which external tools or skills your agent may call and whether those tools have appropriate permissions and auditing; (2) the SKILL.md references template variables and an external 'setup: skillboss.co/skill.md' line — verify any runtime substitutions and avoid following unknown external setup URLs unless you trust them. If you want tighter control, ask the author to enumerate allowed target tools and provide explicit mapping rules for assignment.

Like a lobster shell, security has layers — review code before you run it.

latestvk976ajw5tjjea0vz1xk0n1s66d84zygy

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments