Meta-Cognition Coach

v1.0.1

Meta-cognition coaching assistant - help students develop thinking-about-thinking skills, reflection habits, and learning strategy awareness

0· 321·0 current·0 all-time
byhaidong@harrylabsj·duplicate of @harrylabsj/study-reminder
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (meta-cognition coach) align with included files and required actions: the skill generates reflection prompts, strategy suggestions, and monitoring feedback. It does not request unrelated credentials, binaries, or system resources.
Instruction Scope
SKILL.md instructs the agent to run the included Python script (scripts/main.py), which stays within the stated purpose. The script does write user-provided inputs to local log files (reflection_log.json, strategy_log.json) in the current working directory — this is expected for a journaling tool but is a privacy consideration.
Install Mechanism
Instruction-only with a provided Python script; there is no install spec, no downloads, and no external packages required. This minimizes supply-chain risk.
Credentials
The skill requests no environment variables, credentials, or privileged config paths. There are no apparent attempts to access unrelated secrets or services.
Persistence & Privilege
The skill does persist data by appending JSON logs to files in the working directory; it does not request always:true or modify other skills or system settings. The local file writes are low-privilege but may contain sensitive user input.
Assessment
This skill appears coherent and limited to its stated coaching purpose. Before installing: (1) be aware it writes user inputs to reflection_log.json and strategy_log.json in the current directory — avoid entering sensitive personal data or run it in a private/isolated folder; (2) verify you are comfortable running a bundled Python script locally; (3) if you plan to use it for students, consider where logs will be stored and whether you need to encrypt or periodically purge them; (4) no network access or extra credentials are requested, so risk is limited to local data persistence.

Like a lobster shell, security has layers — review code before you run it.

educationvk97b6w3zypnhgbzr1e50a2hk4d843x23latestvk97b6w3zypnhgbzr1e50a2hk4d843x23learningvk97b6w3zypnhgbzr1e50a2hk4d843x23metacognitionvk97b6w3zypnhgbzr1e50a2hk4d843x23reflectionvk97b6w3zypnhgbzr1e50a2hk4d843x23studyvk97b6w3zypnhgbzr1e50a2hk4d843x23

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments