Germination
v1.0.0Seed germination reference — imbibition, dormancy breaking, temperature/moisture requirements, testing protocols. Use when planning seed starting, evaluating...
⭐ 0· 79·0 current·0 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description describe a seed-germination reference and the skill only contains a local bash script and a SKILL.md providing commands that print guidance. There are no unrelated credentials, binaries, or installs requested.
Instruction Scope
SKILL.md tells the agent to run the included scripts/script.sh commands (intro, conditions, dormancy, testing, crops, problems, etc.). Those commands produce local reference text. The instructions do not direct reading unrelated system files, sending data externally, or broad data-collection.
Install Mechanism
No install spec is present (instruction-only with a bundled script). Nothing will be downloaded or extracted from external URLs during install.
Credentials
No required environment variables or credentials are declared. SKILL.md documents an optional GERMINATION_DIR config (defaulting to ~/.germination/), which is proportionate for storing user data if implemented.
Persistence & Privilege
always is false and the skill is user-invocable. disable-model-invocation is false (agent may call it autonomously), which is the platform default; nothing in the skill requests elevated or persistent system privileges or modifies other skills.
Assessment
This skill appears coherent and low-risk: it runs a local bash script that prints germination reference material and asks for no secrets or network installs. Before installing, you may (1) quickly open scripts/script.sh end-to-end to confirm there are no unexpected commands (network calls like curl/wget, eval, or writes to sensitive paths), (2) ensure you trust the author (bytesagain.com), and (3) if you prefer, run the script manually rather than allowing autonomous invocation. If you see any commands that contact external hosts or modify system-wide configuration, do not install or run it.Like a lobster shell, security has layers — review code before you run it.
latestvk977r4dweq3bc9dzas0ned42yn83a93y
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
