OPC 案例调研

v0.1.0

Systematic public-information research for OPC, super-individual, creator IP, and one-person business cases, with Chinese outputs focused on content strategy...

1· 58·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (OPC case research focused on creator/one-person-business cases) match the SKILL.md and included templates/references. No unrelated binaries, env vars, or external credentials are requested.
Instruction Scope
Runtime instructions are limited to public-information research, building source maps, timelines, and evidence tables; they explicitly forbid digging for private data and emphasize separating facts/inferences/unknowns. The guidance does not instruct the agent to read system files, exfiltrate environment variables, or contact unexpected endpoints.
Install Mechanism
No install spec and no code files (instruction-only). Nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths. Requested assets are local templates and reference docs consistent with the stated function.
Persistence & Privilege
Flags are default: always:false and normal autonomous invocation allowed. The skill does not request permanent presence or system-level configuration changes.
Assessment
This skill is instruction-only and coherent with its stated purpose: it uses public sources, provides templates, and asks for no credentials or installs. Before installing, note that (1) outputs default to Chinese—confirm language if you need another; (2) the skill emphasizes using public information and avoiding private data—do not prompt it to research non-public or sensitive personal details; and (3) although the skill itself is benign, any research report could contain unverified inferences—ask for clear source links and the evidence snapshot if you require traceability or legal caution.

Like a lobster shell, security has layers — review code before you run it.

latestvk97761jpr40yx6p5c4krhvczsd84dgzh

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments