le2le-blog-writer

v1.0.0

根据用户提供的文章或主题,生成结构清晰、语言自然且具备深度思考的高质量中文原创博客文章。

1· 256·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and SKILL.md all describe producing an original Chinese blog article from a user-supplied topic or article. The skill declares no binaries, env vars, or installs — that aligns with being an instruction-only text-generation helper.
Instruction Scope
The SKILL.md gives detailed guidance for style, structure, and constraints (e.g., >800 words, avoid sentence-by-sentence rewriting, don't output analysis). This stays within the stated purpose. One caution: the instructions encourage producing a ‘new’ article based on user-supplied source material; that can raise copyright or confidentiality concerns depending on what users paste in. The skill does not instruct reading system files, env vars, or contacting external endpoints.
Install Mechanism
No install spec or code files are present; nothing is written to disk or downloaded at install time. This is the lowest-risk install posture.
Credentials
The skill requires no environment variables, credentials, or config paths — appropriate and proportionate for a text-generation utility.
Persistence & Privilege
Defaults are used (not always: true), user-invocable and model-invocation allowed — these are normal for skills. The skill does not request persistent presence or elevated privileges.
Assessment
This skill appears internally consistent and does not request extra permissions, but before using it you should: (1) avoid pasting private/confidential data or unreleased drafts — the skill will rewrite whatever you give it; (2) be mindful of copyright — rewriting third-party articles can create derivative works and may require permission; (3) verify factual claims and style output (LLMs can hallucinate or introduce inaccurate analysis); (4) if you need provenance or citations, modify the prompt to require explicit source attribution rather than allowing the skill to silently rewrite input; (5) if you want to limit reuse risk, provide only topics (not full articles) or paraphrase content you own before asking the skill to expand.

Like a lobster shell, security has layers — review code before you run it.

latestvk974esz613q3mr711ke0jksgz582nm30

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments