paper reference checker
v1.2.1This skill should be used when the user asks to "check paper citations", "verify references", "detect fake citations", "validate bibliography", "check if pap...
⭐ 4· 137·0 current·0 all-time
byBen Chen@benchen4395
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the instructions: extracting citations from PDFs/Overleaf/links and querying Google Scholar, arXiv, CNKI, Crossref, etc. The skill does not request unrelated environment variables, binaries, or config paths.
Instruction Scope
Instructions focus on targeted extraction and multi-database querying (DOI/arXiv/Google Scholar/CNKI/etc.). This is appropriate, but the SKILL.md assumes the agent will perform web queries/scraping (e.g., Google Scholar) without discussing rate limits, terms-of-service, or how to handle private Overleaf projects — users should expect the agent to read uploaded PDFs or any public links they provide.
Install Mechanism
No install spec and no code files — instruction-only. No downloads or packages are requested, which minimizes disk/write risk.
Credentials
The skill requests no environment variables, credentials, or config paths. This is proportionate to the stated purpose; however, the skill assumes access to publicly-queryable databases and user-supplied documents/links.
Persistence & Privilege
always is false and there is no indication the skill attempts to persist or modify agent/system configuration. Autonomous invocation is allowed by default, which is normal and not by itself concerning here.
Assessment
This skill is instruction-only and coherent with its purpose, but before installing/using it consider: (1) it will read any PDFs or Overleaf links you provide — do not upload sensitive or private documents unless you consent; (2) queries to Google Scholar and other databases may involve scraping and could be rate-limited or violate a provider's terms of service — expect possible blocking or incomplete results; (3) private Overleaf projects require credentials which the skill does not request — the agent can't access private content without you providing access; and (4) there is no install code or external service where your data is sent, but you should still avoid sharing confidential material. If you need checks against subscription-only databases, plan for providing appropriate access tokens and verify compliance with those services' policies.Like a lobster shell, security has layers — review code before you run it.
latestvk97e6eahfqx6pmjdypf005wfhn84ccp0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
