Relate Coach

v1.0.2

Relate Coach helps users improve everyday communication, set healthier boundaries, de-escalate conflict, and maintain better relationships through practical...

0· 80·0 current·0 all-time
byhaidong@harrylabsj
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name, description, SKILL.md, and included Python modules align: the code implements intent detection, playbooks, and boundary/crisis checks appropriate for a communication coach. No unrelated services, binaries, or credentials are requested.
Instruction Scope
SKILL.md confines behavior to low-stakes coaching, de-escalation, and referrals. The included scripts only scan user text for keywords and generate canned responses/playbooks; they do not read other system files, access environment variables, or send data to external endpoints.
Install Mechanism
There is no install spec or external download. The skill is instruction/code-only; all code is included in the bundle and there are no network fetches or extract-from-URL steps in the manifest.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. The code does not reference secrets or external service tokens.
Persistence & Privilege
always is false and default autonomy is allowed (normal). The skill does not request permanent platform presence, does not modify other skills, nor does it access privileged system configuration.
Assessment
This skill appears coherent and limited to text-based communication coaching: it flags crisis/out-of-scope topics and recommends professional referral where appropriate. Before installing, confirm your platform runs skill code in a sandbox (so user text is not logged or transmitted by the runtime) and be aware this is not a substitute for professional mental-health or legal help. If you want extra assurance, you can review the included Python files yourself or ask the publisher how runtime logs and telemetry are handled.

Like a lobster shell, security has layers — review code before you run it.

boundary-settingvk97a98zfxy3eq0pd1s7n45x65d843xd0communicationvk97a98zfxy3eq0pd1s7n45x65d843xd0conflictvk97a98zfxy3eq0pd1s7n45x65d843xd0interpersonal-skillsvk97a98zfxy3eq0pd1s7n45x65d843xd0latestvk97a98zfxy3eq0pd1s7n45x65d843xd0relationshipsvk97a98zfxy3eq0pd1s7n45x65d843xd0self-helpvk97a98zfxy3eq0pd1s7n45x65d843xd0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments