First Principles Analysis
v1.0.0Deep first-principles analysis of any topic, decision, strategy, or assumption. Strips inherited thinking, identifies what is provably true, and rebuilds fro...
⭐ 0· 88·0 current·0 all-time
byRunByDaVinci@clawdiri-ai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (first-principles analysis) match the SKILL.md instructions. No environment variables, binaries, or installs are requested, which is proportionate for a purely analytical/instructional skill.
Instruction Scope
The SKILL.md gives a detailed, deterministic multi-phase process for analysis and does not instruct the agent to read files, access environment variables, call external services, or transmit data. It gives broad cognitive discretion to the agent (choose and test assumptions), which is expected for an analysis skill — watch for overreach when the agent autonomously gathers external data, but the skill itself does not direct that behavior.
Install Mechanism
No install spec and no code files are present. This is the lowest-risk model: nothing will be written to disk or fetched during install by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no disproportionate requests for secrets or unrelated credentials.
Persistence & Privilege
always:false, no install, and no instructions to modify agent or system configuration. The skill does not request persistent agent-level privileges.
Assessment
This skill is internally coherent and low-risk: it's purely an instruction template for performing 'first-principles' analyses and does not request installs, credentials, or filesystem access. Before using, keep in mind: (1) the agent may still base conclusions on incorrect or hallucinated facts — ask for sources or verification for factual claims; (2) do not paste secrets or sensitive documents into prompts you want analyzed; and (3) if you need the agent to use real-world data (financials, logs, etc.), prefer uploading vetted data or instructing the agent to cite sources rather than implicitly trusting its external knowledge.Like a lobster shell, security has layers — review code before you run it.
latestvk9739tqe45y7m0e941d4w43b1h839a0g
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
