发芽报告
v1.0.0发芽报告 - 将录音或对话内容转化为多维度的深度分析报告,发现意想不到的洞察、故事连接和创作角度。当用户有话题想深入分析、录音需要转写分析、多角度思考问题时使用。
⭐ 0· 55·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (deep analysis of recordings/dialogues) align with the SKILL.md content: it describes inputs (audio/transcript/topic) and a structured 6‑part report. The skill does not ask for unrelated binaries, credentials, or config paths.
Instruction Scope
SKILL.md asks for audio files or transcripts and says "I will help you transcribe," but does not specify how transcription will be performed. The rest of the instructions stay within the analysis/reporting scope. The lack of a specified transcription method leaves implementation details (e.g., whether audio is uploaded to an external service) up to the agent — a privacy/data‑handling consideration rather than an outright incoherence.
Install Mechanism
No install spec and no code files — instruction‑only skill. Nothing is written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. Requested capabilities are proportional to the described functionality.
Persistence & Privilege
No always:true, no elevated persistence, and it does not attempt to modify other skills or system settings. Autonomous invocation is allowed by default but not combined with other red flags.
Assessment
This skill appears coherent and does what it claims: produce multi‑angle analysis reports from audio or text. Before using it with sensitive recordings, ask how transcription is performed — confirm whether audio is uploaded to third‑party services or handled within the agent/host. If you have private or regulated material, prefer providing a local transcript you control, or ask the developer/platform for their data‑handling/privacy policy. Also confirm retention: where are generated reports stored and who can access them.Like a lobster shell, security has layers — review code before you run it.
latestvk975np3kwm337tnnvnty232b3s84511m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
