Model
v1.0.0A comprehensive AI agent skill for anyone working with AI models. Helps you choose the right model for any task, write effective prompts, evaluate model outp...
⭐ 0· 292·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description match the SKILL.md content: guidance on choosing models, prompting, evaluation, and workflows. There are no unrelated requirements (no env vars, binaries, or config paths) that would be disproportionate to this purpose.
Instruction Scope
The SKILL.md contains advice and procedures for interacting with models and building workflows. It is instruction-only and does not direct the agent to read local files, access external endpoints, or exfiltrate data beyond normal model usage. No vague, broad directives (like 'gather whatever context you need') were found in the provided excerpt.
Install Mechanism
There is no install specification and no code files, so nothing will be downloaded or written to disk during install. This is the lowest-risk install profile.
Credentials
The skill declares no required environment variables, credentials, or config paths. It does not request access to external service tokens or secrets, which is proportionate to an advisory/instructional skill.
Persistence & Privilege
always is false and the skill is user-invocable. disable-model-invocation is false (normal), meaning the agent could invoke this skill autonomously when eligible; this is expected for skills and is not by itself a concern.
Assessment
This skill is instruction-only and internally consistent with its stated purpose: it provides guidance on model choice, prompting, evaluation, and workflows and does not request credentials or install software. Before installing, review the full SKILL.md to ensure later sections do not ask for secrets or system access; if you prefer to prevent autonomous usage, you can disable model invocation for the skill or only invoke it manually. If you plan to follow its advice to call external APIs or run tools, be cautious about where you store and provide any credentials those steps may require.Like a lobster shell, security has layers — review code before you run it.
aivk970tdg2zktgy0e5yh1x67q61x82h246latestvk970tdg2zktgy0e5yh1x67q61x82h246llmvk970tdg2zktgy0e5yh1x67q61x82h246modelvk970tdg2zktgy0e5yh1x67q61x82h246promptvk970tdg2zktgy0e5yh1x67q61x82h246workflowvk970tdg2zktgy0e5yh1x67q61x82h246
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
