OPM Modeler

v1.0.0

Model systems using Object-Process Methodology (OPM/ISO 19450). Use when the user asks to model a system, create an SD, build OPDs, write OPL sentences, refi...

0· 73·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (OPM modelling, SD/OPD/OPL creation and validation) match the SKILL.md and the three included normative references. There are no unrelated required binaries, env vars, or config paths.
Instruction Scope
Runtime instructions are prescriptive modelling steps: which sections of the included references to read, a 4-phase procedure, hard modelling rules, and output format. The SKILL.md references only the local reference files and specifies to load relevant sections; it does not instruct reading unrelated files, calling external endpoints, or accessing credentials.
Install Mechanism
There is no install spec and no code files — the skill is instruction-only, so nothing is downloaded or written to disk during install.
Credentials
The skill requests no environment variables, credentials, or config paths. The declared primary credential is none, which is proportionate for a purely instructional modelling skill.
Persistence & Privilege
always is false and disable-model-invocation is false (default autonomous invocation allowed). This is normal for skills; the skill does not request elevated persistence or modify other skills or system settings.
Assessment
This skill appears coherent and low-risk: it is purely instructional and includes three large reference documents to drive OPM modelling. Before using, avoid pasting confidential or proprietary system details into the prompt (the skill will echo model facts and generate textual OPL). If you do not want the agent to call this skill autonomously, disable model invocation for it in your agent settings. If you need stronger guarantees, review the included reference files locally to confirm they match your expectations; there is no network activity or credentials required by the skill itself.

Like a lobster shell, security has layers — review code before you run it.

conceptual-modelingvk97ewf56k78jh9tc4wn2x3gkkx83x2hmiso-19450vk97ewf56k78jh9tc4wn2x3gkkx83x2hmlatestvk97ewf56k78jh9tc4wn2x3gkkx83x2hmmbsevk97ewf56k78jh9tc4wn2x3gkkx83x2hmoplvk97ewf56k78jh9tc4wn2x3gkkx83x2hmopmvk97ewf56k78jh9tc4wn2x3gkkx83x2hmsystem-diagramvk97ewf56k78jh9tc4wn2x3gkkx83x2hmsystems-engineeringvk97ewf56k78jh9tc4wn2x3gkkx83x2hm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments