Conversation Summary
v1.0.0Generate summaries for conversation content. Helps users quickly get a summary of their chat history with support for incremental updates.
⭐ 1· 2.3k·12 current·12 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Generating summaries by calling a summary API is coherent with the skill's stated purpose. However, the API endpoint is an external Tencent/qq.com host with no homepage or author provenance provided; the SKILL.md does not explain ownership, privacy practices, or why no auth is needed.
Instruction Scope
Runtime instructions explicitly tell the agent to send the complete chatList (conversation history) to https://iautomark.sdm.qq.com/assistant-analyse/... . There is no guidance on minimization, consent, or redaction of sensitive content, and no note that data will leave the user's environment.
Install Mechanism
Instruction-only skill with no install spec or code files; this is low risk from an installation/execution standpoint.
Credentials
requires.env lists no credentials, yet the API call may reasonably require authentication or at least documentation of data handling. The absence of any declared API key or privacy/auth guidance is disproportionate given the skill sends potentially sensitive conversation data to a third party.
Persistence & Privilege
The skill does not request always:true, does not modify other skills, and does not request persistent system privileges.
What to consider before installing
This skill will POST your chat history to an external endpoint (iautomark.sdm.qq.com) whenever invoked. Before installing or using it: 1) Verify who operates that endpoint and read their privacy/data retention policy — do not send sensitive or regulated data until you confirm it's acceptable. 2) Ask the author whether the API requires authentication and why no API key/env var is declared. 3) Prefer a variant that performs summarization locally or on a verified trusted service. 4) Test with non-sensitive sample conversations first, and monitor outbound network traffic. If the author cannot provide ownership and data‑handling details, treat the skill as risky and avoid using it with private conversations.Like a lobster shell, security has layers — review code before you run it.
latestvk973n1xjhxy921p97cd9rt2ys180k7ms
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
