Rag Construction

v2.1.0

Build RAG systems for construction knowledge bases. Create searchable AI-powered construction document systems

6· 1.5k·6 current·6 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (RAG for construction documents) aligns with the provided SKILL.md code and instructions: document and chunking classes, chunking strategies, and guidance for ingesting CSV/Excel/JSON/files. Requiring python3 and filesystem access is expected for processing local documents.
Instruction Scope
SKILL.md and instructions.md focus on ingesting user-provided project data and files, chunking, embedding, search, and export. The instruction material restrains actions to data supplied or referenced by the user. There is no instruction to read unrelated system files, environment secrets, or to transmit data to unknown endpoints in the provided content.
Install Mechanism
There is no install spec and no external downloads; the skill is instruction-only. That minimizes disk writes and arbitrary code installation risk.
Credentials
The skill declares no environment variables or API credentials. The only non-code permission in claw.json is filesystem access, which is proportionate for a tool that ingests and exports local documents.
Persistence & Privilege
always is false and the skill does not request persistent/global privileges or modifications to other skills. It does request filesystem access (manifest permission), which is expected for document ingestion but is the primary privilege to be aware of.
Assessment
This skill appears coherent and does not ask for credentials or external installs. Note it has filesystem permission (to read files you point it at) — only provide the project files you intend to index and avoid supplying sensitive system files or credentials. If you later connect cloud storage or APIs for embeddings/search, expect to supply appropriate keys then; review those requests before granting them.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fs2rnba9bz5asckz72eadxx817j18

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🐼 Clawdis
OSmacOS · Linux · Windows
Binspython3

Comments