白月光 | Moonlight Map
v0.1.0把忘不掉的那个人的碎片记忆整理成一份月光档案。重点是理解、命名、归档,不做角色扮演。主输出是月光图谱+未寄出的信。
⭐ 0· 45·0 current·0 all-time
byCong Zhao@happle940
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (emotional-mapping, journaling) match the SKILL.md instructions: collecting 'fragments', producing a structured '月光档案' and an optional unsent letter. No unexplained requirements (no env vars, binaries, or config paths).
Instruction Scope
The runtime instructions are narrowly focused on conversational prompts, structuring user-provided fragments, labeling uncertainty, and crisis escalation. They explicitly forbid role‑playing the other person and limit collection of identifiable information. The skill does not instruct reading files, environment, or sending data to external endpoints.
Install Mechanism
There is no install spec and no code files—this is an instruction-only skill. That minimizes on-disk risk and the static scanner had nothing to analyze.
Credentials
The skill requires no environment variables, credentials, or config paths. All data comes from user input and the SKILL.md explicitly minimizes collection of PII. Requested access is proportionate to the stated functionality.
Persistence & Privilege
Flags show always:false and standard agent invocation behavior. The skill does not request persistent or elevated privileges and has no install step that would alter other skills or system settings.
Assessment
This skill appears coherent and low-risk because it's instruction-only and asks for nothing beyond what the user types. Before installing or using it: avoid pasting real names, contact details, workplaces, addresses, or screenshots containing PII; treat its output as reflective writing, not professional therapy; if you are in crisis or have self-harm thoughts follow the crisis guidance it gives and contact real-world help; and remember the skill's source is unknown—if privacy is a concern keep sensitive details out of the conversation.Like a lobster shell, security has layers — review code before you run it.
emotional-mappingvk978bah1nwxakv8pc0n137jm9h84cf5rjournalingvk978bah1nwxakv8pc0n137jm9h84cf5rlatestvk978bah1nwxakv8pc0n137jm9h84cf5rreflectionvk978bah1nwxakv8pc0n137jm9h84cf5rrelationshipvk978bah1nwxakv8pc0n137jm9h84cf5r
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
