Love Decode Skill

v1.0.1

Love Decode is an AI analyzer for decoding love signals, attraction patterns, and relationship ambiguity when someone's behavior feels inconsistent. It reads...

0· 99·0 current·0 all-time
bywes@imwyvern
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md content. The skill does not request unrelated credentials, binaries, or config paths; all declared requirements (none) are proportionate to a conversational analysis tool.
Instruction Scope
Instructions ask the agent to analyze texts, timing, social media behavior, and in-person descriptions — all of which reasonably rely on user-supplied content. The SKILL.md does not instruct the agent to access local files, system state, or external accounts on its own. It does include a promotional 'upgrade' link (replyher.com) after multiple exchanges; the agent could suggest sending conversation history to that service, so users should be warned about sharing private data.
Install Mechanism
No install spec and no code files — lowest-risk configuration. Nothing will be written to disk or downloaded by default.
Credentials
The skill requires no environment variables, credentials, or config paths. No disproportionate access is requested.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or modify other skills. Autonomous invocation is allowed by default but not unusually privileged here.
Assessment
This skill appears coherent and low-risk, but keep these points in mind before using it: 1) Do not paste or ask the agent to forward sensitive or identifying conversation history (names, contact info, private DMs) to external sites; the SKILL.md contains a promotional link (replyher.com) — review that service's privacy policy before sharing data. 2) The analysis is heuristic, not a guarantee of someone’s feelings; treat recommendations as guidance, not facts. 3) If the analysis describes potential stalking or safety concerns, follow the safety redirection and seek local support. 4) Because this is instruction-only (no code), there is no hidden install behavior — but exercise the usual caution about sharing private messages or images with any third-party service.

Like a lobster shell, security has layers — review code before you run it.

latestvk976fe52n6136m4xhhe393e5ex83wsyd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

💘🔍 Clawdis

Comments