Skill Authoring
v1.0.0Create, edit, and package new AgentSkills. Use when asked to create a skill, build a skill, author a skill, or when需要对技能进行创建、打包或审核。Triggers on phrases like "...
⭐ 0· 38·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name and description (Skill Authoring) align with the provided SKILL.md, references/design-patterns.md, and the helper script. The included list_skills.py and the content of SKILL.md are coherent with a workflow for creating, packaging, and inspecting AgentSkills.
Instruction Scope
SKILL.md instructs the user/agent to run external helper scripts (init_skill.py and package_skill.py) and to operate on system paths (examples reference /var/root/.openclaw/... and /usr/local/lib/node_modules/openclaw/...). Those actions are within the scope of authoring skills but require access to filesystem locations and external tooling that are not included in this package. No instructions attempt to read unrelated secrets or send data to external network endpoints.
Install Mechanism
There is no install spec — the skill is instruction-only plus a small utility script. That is low-risk. Note: the SKILL.md expects external tools (the skill-creator scripts) to exist in system locations; those tools are not part of this bundle and should be audited where they come from.
Credentials
The skill does not request environment variables, credentials, or config paths. The included script reads local skill directories (some of which are under /var/root), which is reasonable for a skill-management utility.
Persistence & Privilege
always is false and the skill does not request elevated or persistent privileges. It does not modify other skills' configurations in the files provided.
Assessment
This package appears to be a coherent skill-authoring guide plus a small utility to list installed skills. Before using it: 1) Verify the external helper scripts it tells you to run (init_skill.py and package_skill.py) are from a trusted source and inspect their code — they are not included here. 2) Avoid running commands as root or against /var/root unless you understand and control those locations. 3) Check any referenced system paths (/usr/local/lib/node_modules/openclaw/..., /var/root/.openclaw/...) exist and are owned by trusted software. 4) Review package_skill.py/init_skill.py for any network calls or data exfiltration before executing. If you cannot inspect the external tooling, treat running those scripts as higher risk.Like a lobster shell, security has layers — review code before you run it.
latestvk97d786ezr75feb1ybppfmsp8d84vnf6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
