paper reference checker

v1.2.1

This skill should be used when the user asks to "check paper citations", "verify references", "detect fake citations", "validate bibliography", "check if pap...

4· 137·0 current·0 all-time
byBen Chen@benchen4395
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the instructions: extracting citations from PDFs/Overleaf/links and querying Google Scholar, arXiv, CNKI, Crossref, etc. The skill does not request unrelated environment variables, binaries, or config paths.
Instruction Scope
Instructions focus on targeted extraction and multi-database querying (DOI/arXiv/Google Scholar/CNKI/etc.). This is appropriate, but the SKILL.md assumes the agent will perform web queries/scraping (e.g., Google Scholar) without discussing rate limits, terms-of-service, or how to handle private Overleaf projects — users should expect the agent to read uploaded PDFs or any public links they provide.
Install Mechanism
No install spec and no code files — instruction-only. No downloads or packages are requested, which minimizes disk/write risk.
Credentials
The skill requests no environment variables, credentials, or config paths. This is proportionate to the stated purpose; however, the skill assumes access to publicly-queryable databases and user-supplied documents/links.
Persistence & Privilege
always is false and there is no indication the skill attempts to persist or modify agent/system configuration. Autonomous invocation is allowed by default, which is normal and not by itself concerning here.
Assessment
This skill is instruction-only and coherent with its purpose, but before installing/using it consider: (1) it will read any PDFs or Overleaf links you provide — do not upload sensitive or private documents unless you consent; (2) queries to Google Scholar and other databases may involve scraping and could be rate-limited or violate a provider's terms of service — expect possible blocking or incomplete results; (3) private Overleaf projects require credentials which the skill does not request — the agent can't access private content without you providing access; and (4) there is no install code or external service where your data is sent, but you should still avoid sharing confidential material. If you need checks against subscription-only databases, plan for providing appropriate access tokens and verify compliance with those services' policies.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e6eahfqx6pmjdypf005wfhn84ccp0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments