kk-innovation

v1.0.0

KK Innovation Advisor: Think like Kevin Kelly about innovation, products, and the future. Based on the Nine Laws, 12 Inevitable Forces, and 12 New Rules.

0· 60·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the content of SKILL.md: the skill asks for user input and applies Kevin Kelly frameworks to generate product and trend advice. There are no unrelated binaries, credentials, or config requirements.
Instruction Scope
SKILL.md is a question-driven advisory workflow. It does not instruct the agent to read system files, environment variables, run shell commands, or transmit data to external endpoints unrelated to the user interaction. (The SKILL.md content is truncated in the manifest but the visible instructions are limited to user questions and framework-based analysis.)
Install Mechanism
No install spec and no code files — instruction-only skills write nothing to disk and carry minimal runtime risk.
Credentials
The skill declares no required environment variables, credentials, or config paths; there is no disproportionate secret or system access requested.
Persistence & Privilege
always is false (normal). disable-model-invocation is false (normal platform default). The skill does not request persistent agent privileges or to modify other skills/configs.
Assessment
This skill appears coherent and low-risk because it only asks for your idea and applies established frameworks. Two practical cautions: (1) Source/provenance is unknown (no homepage or clear author) — you cannot verify who will maintain or update it. (2) Avoid pasting secrets, proprietary documents, or personally identifiable data into the prompts; the skill is designed to take user-provided ideas, and anything you enter could be incorporated into outputs. If you need verbatim quotes from Kevin Kelly's books, be mindful of copyright; ask the skill for summaries or attribution rather than requesting long quoted passages.

Like a lobster shell, security has layers — review code before you run it.

latestvk976wrekkr50hp9vy03jdfy0dn83qrqg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments