Computer Science

v1.0.0

Guide CS learning from first programs to research and industry practice.

3· 1.1k·2 current·2 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (guide CS learning from first programs to research and industry practice) match the SKILL.md content, which provides detailed pedagogical instructions for different audiences (beginners, students, researchers, educators, practitioners). There are no unexpected requirements (no binaries, env vars, or config paths).
Instruction Scope
The SKILL.md stays within an educational scope: it prescribes how to adapt explanations, scaffold learning, suggest visualizations, warn about hallucinations in citations, and recommend testing AI-generated code. It does not instruct the agent to read local files, access system state, call external services, or exfiltrate data. The guidance to 'verify every reference in Scholar/DBLP' is a safety note (not an instruction to call a service automatically).
Install Mechanism
There is no install spec and no code files; this is instruction-only. That minimizes risk because nothing is written to disk or fetched during install.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. Nothing in the instructions asks for secrets or unrelated credentials.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or elevated privileges. The default ability for the agent to invoke the skill autonomously is unchanged but not unusual or excessive for an educational skill.
Assessment
This skill appears coherent and low-risk: it's purely instructional and asks for no installs or credentials. Before installing, consider that any AI-provided code, proofs, or citations still need human verification and testing (the SKILL.md even warns about hallucinated citations and buggy code). If the agent ever asks for access to your files, credentials, or to run external installers, treat that as a red flag and deny it. If you plan to let agents act autonomously, monitor their outputs for incorrect citations or unsafe code suggestions and require manual approval for actions that access your system or secrets.

Like a lobster shell, security has layers — review code before you run it.

latestvk9771x2zgv168b8n1a6frc28qs80xfsn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

💻 Clawdis
OSLinux · macOS · Windows

Comments