Chainlink
v1.0.0Assist with Chainlink LINK tokens, oracle integrations, staking, and price feed usage.
⭐ 2· 761·0 current·0 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (Chainlink, LINK tokens, oracles, staking, price feeds) match the SKILL.md content — all sections are relevant developer guidance. No unrelated binaries, env vars, or install steps are requested.
Instruction Scope
SKILL.md provides best-practice guidance and API/contract usage notes only. It does not instruct the agent to read local files, environment variables, or send data to external endpoints, nor does it include open-ended instructions to gather arbitrary context.
Install Mechanism
No install spec or code files are present; this is instruction-only, so nothing is written to disk or installed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The guidance refers to verifying addresses on official docs (docs.chain.link) but does not request secrets or tokens.
Persistence & Privilege
always is false and the skill does not request persistent system privileges or modify other skills. It is user-invocable and can be called autonomously by the agent platform (normal), but the skill itself does not ask for elevated access.
Assessment
This skill is an informational reference about Chainlink and appears coherent and low-risk. Before installing, consider: 1) provenance — the source/homepage is unknown, so prefer official docs (docs.chain.link) for critical actions; 2) this skill will not itself perform transactions or request keys, so never paste private keys or wallet secrets into the agent; 3) if you use an agent to actually interact with wallets/bridges, ensure any transaction actions require explicit user consent and use testnets first; and 4) verify contract addresses and bridge endpoints on official Chainlink documentation rather than relying solely on this skill.Like a lobster shell, security has layers — review code before you run it.
latestvk978nv47c1q5s32p3m9hhc2zwx80x3cy
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⬡ Clawdis
OSLinux · macOS · Windows
