Nearby Breakfast Spots

v0.1.0

Find nearby breakfast spots. Invoke when user asks for breakfast near me.

0· 91·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (find nearby breakfast spots) match the content of SKILL.md. The skill requires no binaries, env vars, or installs and does not ask for unrelated permissions — proportionate to the stated purpose.
Instruction Scope
SKILL.md defines inputs, outputs, error codes, and privacy guidance (only query after user authorizes location, recommend fuzzing coordinates, caching behavior). However it does not specify which data provider(s), API endpoints, or query mechanism to use (or how to authenticate if needed). That vagueness means actual behavior depends on the agent implementation or external connectors; verify where POI data will be fetched and how caching/personal data handling is implemented.
Install Mechanism
No install spec and no code files are present. As an instruction-only skill it does not write files or download artifacts during installation.
Credentials
No environment variables, credentials, or config paths are requested. The only sensitive input is user location, which the doc explicitly restricts to 'after user authorizes' and advises fuzzing.
Persistence & Privilege
always is false and there is no request to modify other skills or system-wide settings. The SKILL.md suggests short-term caching but does not require persistent system-wide privileges.
Assessment
This skill appears coherent and low-risk, but before installing confirm: (1) where the POI data will come from (which API/endpoints and any required credentials), (2) how and where any caching is stored and how long location data is kept, and (3) that the agent enforces the 'only query after user authorizes' rule and applies the described coordinate fuzzing. Because the skill is instruction-only, actual network calls and data handling depend on the agent/integration—ask the publisher or integrator for the concrete provider/endpoints and privacy/caching implementation before granting location access.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dw0bgkh1pb9pbkhnn68e49s83e02c

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments