Unreliable Teleplay Lens
v1.0.0Narrative analysis framework for understanding how multiple works within a shared property or historical tradition can coexist without strict canonical recon...
⭐ 0· 72·1 current·1 all-time
byAnthony Martin@inertia186
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (narrative analysis of conflicting versions) matches the SKILL.md and reference material. The skill requests no binaries, env vars, or config paths that would be unrelated to its stated purpose.
Instruction Scope
Runtime instructions are purely analytic: identify works, event anchors, tone, map variance, and synthesize. There are no commands, file reads, network endpoints, or requests for system data beyond the user's query.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is downloaded, written to disk, or executed by the skill itself.
Credentials
Requires no environment variables, credentials, or config paths. The declared requirements are minimal and appropriate for an analysis-only skill.
Persistence & Privilege
Does not request always:true, does not modify other skills or system settings, and is user-invocable only. Normal autonomous invocation is allowed by platform default but the skill itself has no elevated persistence demands.
Assessment
This skill is an interpretive framework (how to treat multiple versions of a story as coexisting tellings) and is internally consistent. It requests no permissions and installs nothing, so it poses minimal technical risk. Before using, understand its intent: UTL reframes canon disputes toward interpretation rather than declaring a single 'correct' version — if you need authoritative, source-verified facts (e.g., historical primary sources or an official franchise canon ruling), cross-check the agent's analysis against primary materials. Also be aware outputs are subjective literary analysis (not objective truth) and may reflect the framework's assumptions and biases.Like a lobster shell, security has layers — review code before you run it.
latestvk9733jgpr5pt95tetz3vnjyz0183gem5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
