bid-document

v1.0.0

专业标书撰写技能体系,支持从招标文件解读到文档质量控制的全流程工作。

1· 201·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (标书撰写) match the SKILL.md and supplemental document: both describe bid-document analysis, writing, compliance and quality workflows. There are no unexpected environment variables, binaries, or config paths requested that would be unrelated to the stated purpose.
Instruction Scope
SKILL.md confines runtime behavior to reading user-supplied tender documents, extracting requirements, producing outlines/sections, compliance checks and suggesting charts/mermaid code. It does not instruct the agent to read system files, access credentials, or send data to external endpoints.
Install Mechanism
No install spec is present (instruction-only). This minimizes on-disk code installation risk. A single code file exists (scripts/save_paper.py) but it is empty (0 bytes).
Credentials
The skill declares no required environment variables, credentials, or config paths. Its functionality (document analysis and writing) does not appear to require secrets or external service tokens.
Persistence & Privilege
always:false and default model invocation settings are used. The skill does not request persistent or elevated privileges, nor does it modify system or other-skill configuration.
Assessment
The skill appears internally consistent and only uses the instructions in SKILL.md. Before using: (1) avoid pasting highly sensitive or legally privileged documents into any third-party service; (2) note there is no published homepage or known owner provenance—so treat content as unverified and review outputs carefully for legal/contractual commitments; (3) the scripts/save_paper.py file is empty now but could be populated in future updates—re-check new versions for added code or network calls; (4) if the skill later requests API keys, file paths, or system access, that would be unexpected for this purpose and should be treated as a red flag.

Like a lobster shell, security has layers — review code before you run it.

latestvk970355t8b080cfek3xkkpr26n84ajyj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📝 Clawdis

Comments