Psychology Assessment Creator
v1.0.0心理测评内容制作技能,帮助从选题策划、题目设计、评分规则编写到结果内容创作的全流程管理。适用于需要创建心理测评类内容的场景。
⭐ 0· 87·0 current·0 all-time
byzhujianlong@hackzjl
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name and description (心理测评内容制作) match the SKILL.md content: a comprehensive, step-by-step methodology for designing psychological assessments. There are no unrelated requirements (no env vars, binaries, or external services) that would be disproportionate to the stated purpose.
Instruction Scope
Runtime instructions are purely descriptive guidance (topic selection, item design, scoring rules, result copywriting, data-driven optimization). The SKILL.md does not instruct the agent to read files, access environment variables, call external endpoints, or perform system actions outside content creation guidance.
Install Mechanism
There is no install specification and no code files. As an instruction-only skill, it writes nothing to disk and does not fetch or execute remote artifacts.
Credentials
The skill declares no required environment variables, credentials, or config paths. Nothing in the instructions attempts to access secrets or unrelated services.
Persistence & Privilege
always is false (default) and autonomous invocation is allowed (normal). The skill does not request persistent system presence or modification of other skills/settings.
Assessment
This skill appears to be a safe, descriptive guide for producing psychological assessment content. Before installing or using it in production: 1) confirm the skill's provenance if you require formal support or liability guarantees (source is unknown); 2) have any assessment instruments and scoring rules reviewed by qualified psychology professionals before public use—do not treat these guidelines as clinical diagnostics; 3) when you implement assessments in an application, ensure you handle personal data and sensitive responses according to privacy laws and ethical standards (consent, PII minimization, secure storage); and 4) if you later add code/integration (APIs, analytics), re-evaluate for network endpoints, required credentials, and install behavior.Like a lobster shell, security has layers — review code before you run it.
latestvk9712v8v6e80b5ntpbtqkbvkn183g2r3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
