Medical Triage
v1.0.0Classify medical messages (emails, iMessages) as critical, urgent, or routine based on medical urgency indicators.
⭐ 0· 732·5 current·5 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the instructions: the SKILL.md describes classifying message text into critical/urgent/routine and expects JSON messages as input. No unrelated credentials, binaries, or services are requested.
Instruction Scope
Runtime instructions operate only on supplied message fields (subject, body, date, etc.). They do not instruct reading system files, environment secrets, or sending data to external endpoints beyond the model execution environment.
Install Mechanism
No install spec and no code files — lowest-risk form. The skill is purely instructional and does not pull or extract archives or external binaries.
Credentials
The skill declares no required environment variables, credentials, or config paths; its needs (only message JSON input) are proportionate to the stated function.
Persistence & Privilege
Defaults apply (not always: true). The skill does not request permanent presence or elevated privileges and does not modify other skills' configs.
Assessment
This skill appears internally consistent, but note practical and privacy considerations before use: it will classify medical messages but is not a substitute for clinician judgment — route 'critical' items to a human immediately. Because it processes potentially sensitive health information (PHI), ensure your deployment complies with relevant regulations (e.g., HIPAA), logging policies, and data-retention rules. Avoid sending raw PHI to third-party hosted models unless you have proper agreements; consider de-identifying messages or using an internal model. Test extensively with representative examples, set conservative thresholds for automated actions, and keep a human-in-the-loop for any escalation or treatment recommendations.Like a lobster shell, security has layers — review code before you run it.
latestvk970fbqf56ns3a6r0fm5wywj8981yy0a
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
