Stoic Scope Creep

v1.0.0

A practical guide for maintaining composure and effectiveness when project boundaries expand unexpectedly. Apply Stoic philosophy to one of the most common sources of workplace frustration.

1· 1.8k·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (Stoic responses to scope creep) align with the content of SKILL.md. The skill requests no binaries, env vars, or config paths and does not claim capabilities beyond providing guidance and scripts for common scenarios.
Instruction Scope
SKILL.md contains only coaching material, example scripts, and practice protocols. It does not instruct the agent to read files, access environment variables, make network calls, or execute commands outside the agent's normal conversational behavior.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing will be written to disk or downloaded during install, so install-related risk is minimal.
Credentials
The skill declares and requires no environment variables, credentials, or config paths. There is no disproportionate access requested relative to the stated purpose.
Persistence & Privilege
always is false (default). The skill can be invoked by the user and the agent may call it autonomously per platform defaults, which is expected behavior for a content/response skill and not problematic here.
Assessment
This skill appears low-risk: it is text-only guidance on applying Stoic principles to scope creep and requests no system access or credentials. If you plan to deploy it widely, verify the wording fits your organization's communication style and legal/policy requirements (e.g., don’t substitute these scripts for formal change-control or contractual processes). Because it’s instruction-only, there is no code to audit — the main check is whether you trust the content and want those suggested phrases/behaviors used by the agent.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b4cs46rxb9eqx2dvftydap980czfkmindsetvk97b4cs46rxb9eqx2dvftydap980czfkproductivityvk97b4cs46rxb9eqx2dvftydap980czfkproject-managementvk97b4cs46rxb9eqx2dvftydap980czfksoft-skillsvk97b4cs46rxb9eqx2dvftydap980czfkstoicismvk97b4cs46rxb9eqx2dvftydap980czfk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments