Propmt Archeologist

v1.0.0

Reverse-engineers high-quality, reusable prompts from messy conversations, vague requests, or rough user descriptions. Use this skill whenever a user: wants...

0· 85·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description align with the SKILL.md. The skill's tasks (excavate intent, draft a prompt, explain assumptions) are coherent with a 'prompt archeologist' and it requests no unrelated binaries, environment variables, or config paths.
Instruction Scope
Runtime instructions are limited to reading the user's conversation/description, asking one focused follow-up if needed, producing a formatted prompt, and explaining assumptions. There are no instructions to read system files, access credentials, or send data to external endpoints.
Install Mechanism
Instruction-only skill with no install spec and no code files. Nothing will be written to disk or downloaded during install — lowest risk install posture.
Credentials
The skill declares no required environment variables, credentials, or config paths. The behavior described in SKILL.md doesn't rely on any secrets or external service credentials.
Persistence & Privilege
always is false (default) and the skill does not request persistent system presence or modify other skills. Autonomous invocation is permitted (platform default) but not combined with other risky privileges.
Assessment
This is an instruction-only, coherent skill: it will read the conversation text you give it and produce cleaned, reusable prompts. It does not request any credentials or install software. Before using it, avoid pasting secrets or sensitive personal data into conversations you want 'excavated' (the produced prompt may include those details). If you plan to store excavated prompts externally, be mindful of where you save them — the skill itself does not provide storage or transmit data to third parties.

Like a lobster shell, security has layers — review code before you run it.

latestvk97a6h30c0vhnf2mm1azbb74zd839t8e

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments