Yi

v1.0.0

《周易》智慧工具,提供六十四卦查询、占卜起卦、卦象解读、易经哲学分析、决策参考等功能。Use when user asks about I Ching, Zhouyi, hexagram divination, yarrow stalks, coin tossing, bagua analysis, yin-ya...

0· 202·2 current·2 all-time
byhaidong@harrylabsj
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (I Ching/divination) match the included assets: a SKILL.md describing divination methods and two Python scripts that implement coin, number, and time-based hexagram generation and interpretation. No unrelated binaries, env vars, or cloud credentials are requested.
Instruction Scope
SKILL.md instructs the agent on how to perform hexagram queries and how to simulate or accept user input for divination. It does not instruct reading arbitrary system files, accessing environment variables, or sending data to external endpoints. Runtime behavior is limited to local computation and returning JSON.
Install Mechanism
No install spec provided (instruction-only with bundled scripts). The code lives in the skill bundle and is readable; there are no downloads, third-party installers, or network fetches in the provided files.
Credentials
The skill declares no required environment variables, no primary credential, and no config-path access. The included code does not read env vars or request secrets.
Persistence & Privilege
Skill is not always-enabled and uses the normal model-invocation default. It does not attempt to modify other skills or system-wide agent configuration.
Assessment
This skill appears internally consistent and implements local I Ching/divination logic only: it doesn't request credentials, call external endpoints, or read system secrets. Before installing, consider: (1) the publisher is anonymous and there is no homepage—if provenance matters, prefer skills from known authors; (2) the code is included in the bundle and readable, so you can inspect it yourself; and (3) if you need tighter guarantees, run it in an environment without network access. If you see future versions that add network I/O or request env vars (API keys, tokens), treat that as a new risk and re-evaluate.

Like a lobster shell, security has layers — review code before you run it.

latestvk975rgy9cdc84b2t50sxemkmn182wc9b

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments