Localization
v1.0.0Deep localization workflow—locale strategy, string extraction, ICU and placeholders, formatting, RTL and layout, translation QA, and continuous delivery with...
⭐ 0· 92·0 current·0 all-time
by@clawkk
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (deep localization/i18n workflow) align with the SKILL.md content. There are no unrelated requirements (no env vars, no binaries, no install) that would be disproportionate to a documentation-style skill.
Instruction Scope
The SKILL.md contains high-level, prescriptive guidance for localization stages (strategy, extraction, ICU, RTL, QA). It does not instruct the agent to read system files, access credentials, call external endpoints, or run shell commands — the scope stays within documentation and procedural guidance.
Install Mechanism
There is no install spec and no code files. Being instruction-only means nothing is written to disk or fetched at install time, which is the lowest-risk pattern.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportional and expected for a documentation/workflow skill.
Persistence & Privilege
always is false and model invocation is not disabled (the platform default). That is normal for skills; nothing in this skill requests elevated persistence or modifies other skills or system-wide settings.
Assessment
This skill is an instruction-only localization guide and presents low technical risk because it doesn't install code or request secrets. The primary non-technical concern is provenance: the source and homepage are unknown. If you plan to rely on this in production, consider verifying the publisher (owner ID), checking for an authoritative source or references, and reviewing the SKILL.md for any future edits that might add commands or external calls. Otherwise it is safe to install and use as a documented workflow checklist and guidance.Like a lobster shell, security has layers — review code before you run it.
latestvk974vk5sdewajabc73qahyjk2s83kn8q
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
