Pipeworx superhero
v1.0.0Access detailed profiles and power stats of 731 superheroes and villains from Marvel, DC, and more for comparison and research.
⭐ 0· 34·0 current·0 all-time
byBruce Gutman@brucegutman
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description describe a searchable superhero database; the SKILL.md only documents read-only RPC-style tools (list_all, get_hero, get_powerstats, get_biography) that match that purpose. No unrelated credentials, binaries, or installs are requested.
Instruction Scope
Runtime instructions confine the agent to calling the external API (gateway.pipeworx.io) and using the documented tool methods. The SKILL.md does not instruct the agent to read local files, environment variables, or other unrelated system state.
Install Mechanism
This is an instruction-only skill with no install spec, no code files, and therefore no local code to write or execute—this is the lowest-risk install profile.
Credentials
The skill declares no required environment variables or credentials. However, the agent will make network calls to an external host (gateway.pipeworx.io), so any user-provided query text or content the agent includes in requests will be transmitted to that endpoint.
Persistence & Privilege
always is false and the skill does not request any persistent system privileges or modification of other skills/config. Model invocation is allowed (default) which is normal for skills of this type.
Assessment
This skill appears coherent for querying a superhero dataset and doesn't request credentials or install software. Before installing, verify the gateway domain (gateway.pipeworx.io) and the publisher since no homepage or source is provided. Avoid sending sensitive or private data in queries because all query content will be sent to that external API. If you need guarantees about data handling, ask the provider for documentation (privacy policy, data retention, and origin of the dataset) or run a few non-sensitive test queries first.Like a lobster shell, security has layers — review code before you run it.
latestvk973q8ncmgn7znb94tq73p9hqs84v9gw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
