Grant

v1.0.0

Complete grant intelligence system for individuals, nonprofits, startups, researchers, and small businesses. Trigger whenever someone needs to find grants, w...

0· 274·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (grant finding, writing, compliance) align with the SKILL.md content (eligibility checks, scoring, application architecture, calendars). The skill does not request unrelated binaries, environment variables, or config paths.
Instruction Scope
Runtime instructions are templates, checklists, and workflows for profiling applicants, finding grants, scoring fit, and drafting proposals. They do not direct the agent to read system files, call external endpoints, or exfiltrate data. (The document advises using data and citations, which is normal for writing tasks.)
Install Mechanism
No install spec and no code files — this is an instruction-only skill. That minimizes on-disk execution risk and is proportionate to the skill's purpose.
Credentials
The skill declares no required environment variables, credentials, or config paths. Nothing in the instructions justifies access to secrets or unrelated services.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request elevated or persistent privileges or attempt to modify other skill/system configurations.
Assessment
This skill appears internally consistent and low-risk because it is instruction-only and asks for no credentials or installs. Before using it, avoid pasting sensitive credentials (API keys, passwords, bank account numbers) into prompts; only provide the project- and budget-related information required for drafting. Treat its outputs as drafting assistance — verify eligibility rules, legal terms, and budget items with official funder documents or professional advisors before submitting. If the agent later asks to upload files or access external services, confirm why that is needed and whether you trust the destination.

Like a lobster shell, security has layers — review code before you run it.

applicationvk97c5e6za7ghc5zz6azrpn3f9982h855fundingvk97c5e6za7ghc5zz6azrpn3f9982h855governmentvk97c5e6za7ghc5zz6azrpn3f9982h855grantvk97c5e6za7ghc5zz6azrpn3f9982h855latestvk97c5e6za7ghc5zz6azrpn3f9982h855nonprofitvk97c5e6za7ghc5zz6azrpn3f9982h855

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments