MasterSwarm AI Document Analysis
v1.1.2Analyze any document with 15 parallel AI engines via the MasterSwarm cloud API. Upload receipts, contracts, lab results, or ask business/crypto/legal questio...
⭐ 2· 487·1 current·1 all-time
byHlias Staurou@contrario
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description, declared env var (MASTERSWARM_API_KEY), and the SKILL.md all describe an API connector to a cloud service. The required credential is proportional to the stated functionality (calling an external analysis API).
Instruction Scope
Runtime instructions are limited to constructing and sending POST requests to https://api.neurodoc.app/aetherlang/execute with the API key and user-provided text; they do not instruct reading local files or other environment variables. However, the skill explicitly encourages uploading sensitive documents (receipts, lab results, contracts) to a third-party endpoint and makes privacy/retention claims that cannot be verified from the skill itself. Also note the API host (api.neurodoc.app) differs from the public site (masterswarm.net) though the SKILL.md asserts they are the same operator.
Install Mechanism
Instruction-only skill with no install spec and no code files; nothing is written to disk by the skill itself. This is the lowest-risk install model.
Credentials
Only one environment variable is declared (MASTERSWARM_API_KEY) which is appropriate for an API connector. No unrelated secrets, system paths, or other credentials are requested.
Persistence & Privilege
Skill is not marked always:true, does not request persistent local modifications, and does not claim to modify other skills or global agent settings.
Assessment
This skill behaves like a straightforward API connector and only needs a single API key, but it sends your text/documents to an external service. Before installing: (1) verify the operator and domain mapping (masterswarm.net vs api.neurodoc.app) and confirm the privacy policy and retention promises; (2) avoid sending highly sensitive data (full IDs, passwords, private keys) until you trust the service; (3) test with non-sensitive samples; (4) store the API key securely and be prepared to revoke it if you detect misuse; (5) check billing/credit semantics so you understand cost per call and rate limits. The skill is coherent, but because it transmits data off-device, treat it as exposing that data to a third party and proceed accordingly.Like a lobster shell, security has layers — review code before you run it.
aivk972nvfx70c2jdg4qcbp75kecn82fh5xanalysisvk972nvfx70c2jdg4qcbp75kecn82fh5xbusinessvk972nvfx70c2jdg4qcbp75kecn82fh5xconsultingvk972nvfx70c2jdg4qcbp75kecn82fh5xcryptovk972nvfx70c2jdg4qcbp75kecn82fh5xdocumentsvk972nvfx70c2jdg4qcbp75kecn82fh5xlatestvk972nvfx70c2jdg4qcbp75kecn82fh5xlegalvk972nvfx70c2jdg4qcbp75kecn82fh5xmedicalvk972nvfx70c2jdg4qcbp75kecn82fh5xmulti-agentvk972nvfx70c2jdg4qcbp75kecn82fh5x
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⚡ Clawdis
