Synthesize
v1.0.0Combine multiple sources into unified insights with source tracking, conflict resolution, and coverage verification.
⭐ 2· 679·1 current·1 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the contents: all files are methodological guidance for combining and reconciling sources. There are no unrelated environment variables, binaries, or installs required.
Instruction Scope
Runtime instructions are procedural and scoped to synthesizing provided sources (gather, map, extract, reconcile, verify). They do not instruct reading arbitrary system files, contacting external endpoints, or using credentials. One gap: the docs do not specify handling of sensitive/PII data or retention policies, so the agent's use of user-provided confidential sources should be controlled by the user/host policies.
Install Mechanism
No install spec and no code files — the skill is instruction-only. This minimizes disk write and arbitrary-code risk.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no disproportionate credential request relative to the stated purpose.
Persistence & Privilege
Skill flags are default (always:false, agent invocation allowed). It does not request permanent presence or modifications to other skills. Autonomous invocation is normal and not by itself a concern here.
Assessment
This skill is a methodological template for synthesizing sources and appears safe to install. Before using it: (1) avoid supplying sensitive or secret documents unless you trust the agent/runtime; (2) test the skill on non-sensitive example sources to confirm output format and conflict-handling; (3) enforce any organizational data-handling rules (PII, retention) externally because the skill's docs do not define them; (4) if you see unexpected instructions asking the agent to fetch data from external systems or to use credentials, revoke the skill and investigate. If you want higher assurance, request the author/source and verify there are no hidden instructions or external endpoints.Like a lobster shell, security has layers — review code before you run it.
latestvk972qnyj32mtmrf50egtjxdvtn8107z9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
