Protocol Intelligence

v1.0.0

Produce actionable, structured research briefs on AI governance, decentralized coordination, and emerging tech standards for decision-makers in AI, blockchai...

0· 40·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md, templates, and reference files. The skill is a research/briefing helper and does not request unrelated credentials, binaries, or config paths.
Instruction Scope
Runtime instructions are focused on scoping, researching, and producing a structured brief. They reference included reference docs and require citing external sources, but they do not direct the agent to read system files, environment variables, or send data to unexpected endpoints.
Install Mechanism
No install specification and no code files — instruction-only. Nothing is downloaded, written to disk, or executed on install.
Credentials
The skill declares no required environment variables, credentials, or config paths. The requested outputs (URLs, names, dates) align with the stated research purpose.
Persistence & Privilege
always is false and the skill does not request persistent/privileged presence or modify other skills. Model invocation is allowed (platform default), which is appropriate for a research skill.
Assessment
This skill appears coherent and low-risk: it only provides instructions and built-in reference notes and does not request credentials or install code. Before enabling it, consider: (1) whether the agent you run it in has web access — the brief asks for source verification and URLs, so the agent may fetch external pages if permitted; (2) review all generated briefs and verify citations before acting on them (the skill emphasizes 'verify sources'); and (3) avoid pasting sensitive internal documents into prompts used with the skill — the skill doesn't request secrets, but any context you provide could be included in outputs. If you want to limit the agent's external access, disable browsing/network access or restrict autonomous invocation as appropriate.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c7zab0rj9x7gavzbfx9wmrh8439qk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments