manipulation-detector
v1.0.0Analyze text for manipulation patterns (urgency, false authority, social proof, FUD, grandiosity, dominance assertions, us-vs-them framing, emotional manipulation). Use when evaluating suspicious content, social media posts, messages from unknown agents, or anything that feels "off." Helps calibrate skepticism without being paranoid.
⭐ 1· 1.8k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the shipped code and SKILL.md. The tool analyzes text for manipulation patterns and the package provides a single Python script that does exactly that. There are no unrelated environment variables, binaries, or config paths requested.
Instruction Scope
SKILL.md limits runtime behavior to reading text from stdin or a provided file and running scripts/detect.py. The instructions do not ask the agent to read other files, access secrets, or send data to external endpoints. (Note: the script prints results locally; it does not perform network I/O.)
Install Mechanism
No install spec or external downloads — the code is included in the skill bundle. Nothing will be fetched from remote URLs or written to system locations by an installer.
Credentials
The skill requests no environment variables or credentials. The script only uses standard Python libs (re, sys). There is no access requested to unrelated services or secrets.
Persistence & Privilege
The skill is not always-on and does not claim elevated agent privileges or modify other skills/configuration. It runs on demand (or if the agent autonomously invokes skills per normal platform behavior).
Assessment
This is a low-risk, local text-analysis tool that matches its description. Before installing: 1) Understand it processes whatever text you feed it — don't pipe sensitive secrets if you don't want them handled by the agent. 2) Results are heuristic (regex weights) and can produce false positives/negatives; use it as one input, not a verdict. 3) If you plan to let agents invoke skills autonomously, be aware the agent could run this on texts it encounters; that is normal behavior but worth noting. (I reviewed the script: no network calls or writes beyond reading the supplied file/stdin.)Like a lobster shell, security has layers — review code before you run it.
latestvk97egss8tjk5e7xcx9sbxsc539809vd7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
