GODMODE Battle Agent
v1.0.0Adaptive AI that evaluates health, enemy strength, and zone to select attack, retreat, scout, or deceptive actions maximizing survival and win probability.
⭐ 1· 83·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (battle agent choosing attack/retreat/scout/deception) align with the SKILL.md rules and selectors. All declared capabilities are consistent with an in-game decision policy; no unrelated resources are requested.
Instruction Scope
SKILL.md is entirely local, symbolic pseudocode referencing game-state variables (my_hp, enemies, zone_state) and action labels. It does not instruct reading files, env vars, or contacting external endpoints. However, the instructions are high-level and non-executable (vague fragments like 'emit_noise_direction', 'reduce_accuracy_simulation'), which gives the agent broad interpretive discretion — not a direct security risk but may produce unpredictable behavior if integrated into a live system.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be written to disk or downloaded by the skill itself, minimizing installation risk.
Credentials
The skill declares no environment variables, credentials, or config paths. There are no requests for unrelated secrets or system credentials.
Persistence & Privilege
Flags show normal defaults (always:false, model invocation allowed). The skill does not request permanent presence or cross-skill/system configuration changes.
Assessment
This skill is a high-level rulebook for in-game decision-making and is internally consistent with its description. Before installing: 1) Note it is non-executable pseudocode — you'll need a concrete implementation to make it work; that implementation (not present here) is where runtime risks live. 2) The skill's source is unknown; prefer skills from known maintainers or review/implement the rules yourself. 3) If you plan to integrate this into a system that controls real hardware or interacts with external networks, treat the implementation as potentially risky and do a separate code/security review. 4) Expect unpredictable behavior because the directives are intentionally vague (deceptive/noise actions) — test in a safe sandboxed environment first.Like a lobster shell, security has layers — review code before you run it.
latestvk97e1kq6ftq6rbdm5n92tq6ak983dssw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
