First Principles Analyzer
v0.1.0Deep first-principles analysis of any topic, decision, strategy, or assumption. Strips inherited thinking, identifies what is provably true, and rebuilds fro...
⭐ 0· 75·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md: the skill is an instruction-only reasoning workflow for first-principles analysis. It does not request unrelated binaries, credentials, or config paths.
Instruction Scope
The SKILL.md defines a bounded, step-by-step analytical process (assumption extraction, stress-testing, reconstruction, decision framework). It does not instruct the agent to read files, access system credentials, or exfiltrate data. One minor note: the 'Source audit' step implies checking provenance of claims, which may lead the agent to fetch or request citations, but the skill does not mandate any external network calls or access to secrets.
Install Mechanism
No install specification and no code files are present, so nothing is written to disk or automatically installed. This is the lowest-risk install posture.
Credentials
The skill requires no environment variables, credentials, or config paths. There are no disproportionate requests for secrets or unrelated service tokens.
Persistence & Privilege
always is false and there is no indication the skill modifies other skills or system-wide settings. The skill can be invoked by the user and (per platform default) may be called autonomously, which is expected and appropriate for this kind of reasoning helper.
Assessment
This skill appears coherent and limited to reasoning instructions. Before installing: be aware that the skill's 'source audit' step may prompt the agent to request or fetch external citations (depending on the agent's data access), so verify any factual claims independently. The skill requests no credentials and does not install software, so the main risk is relying solely on its conclusions—treat outputs as analysis to be validated, not authoritative facts. If you want limits, clarify whether the agent may perform web lookups or must rely only on its internal knowledge.Like a lobster shell, security has layers — review code before you run it.
latestvk97ba7m8x8zt37cbftxbr1jgsh83dmag
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
