Assistant
v1.0.0Manage tasks, communications, and scheduling with proactive and organized support.
⭐ 5· 2.7k·14 current·14 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (personal assistant) matches the SKILL.md content (task management, communication, scheduling). There are no unexpected environment variables, binaries, or config paths declared that would be inconsistent with the stated purpose.
Instruction Scope
The SKILL.md contains high-level rules and heuristics for assistant behavior (prioritization, scheduling, summarization, proactive support). It does not instruct the agent to read files, access credentials, or transmit data to external endpoints. Note: the guidance 'remember context from previous conversations' implies state/memory handling, but the skill does not declare any storage/config details — those are implementation concerns outside this file.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing will be written to disk or downloaded by the skill itself.
Credentials
No environment variables, credentials, or config paths are required. The skill does not request any secrets or external-service tokens.
Persistence & Privilege
Flags indicate default behavior (not always: true) and autonomous invocation is allowed (platform default). There is no request to modify other skills or system-wide settings.
Assessment
This skill is a set of behavioral rules only — it does not itself access files, install software, or ask for credentials, so it appears coherent and low-risk. Before enabling it in a live agent, confirm how the agent implementation will store 'context' and whether you'll grant it connectors (email, calendar, messaging) or persistent memory — those connectors and any credentials they require are where privacy and security risk actually arise. If you plan to let the agent act on your behalf (send emails, schedule meetings), restrict and review those integrations, test with limited scope, and monitor outputs. Confidence in this assessment is high given the instruction-only nature; if you have an implementation that adds installs, env vars, or external endpoints, re-run this evaluation.Like a lobster shell, security has layers — review code before you run it.
latestvk972hpnv29dxdf8z4vr5sp6bp180vsk4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📋 Clawdis
OSLinux · macOS · Windows
