Insurance Policy
v1.0.0Read, parse, and explain insurance policy documents in plain language. Highlight coverage limits, exclusions, deductibles, and key terms. Use when users want...
⭐ 0· 155·0 current·0 all-time
byWenbing Ji@jiwenbing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md instructions: the skill asks the user to paste/upload policy text and describes extracting coverage, exclusions, deductibles, limits, and summarizing—no extra services, binaries, or credentials are requested.
Instruction Scope
Instructions are limited to accepting policy text and producing structured summaries and answers about coverage. They do not instruct reading local files, environment variables, or contacting external endpoints. Note: asking users to paste/upload whole policies may expose sensitive personal data (PII) in the documents; the SKILL.md does not provide guidance on redacting or protecting that data.
Install Mechanism
No install spec or code files—this is instruction-only, so nothing is written to disk and no external packages are fetched.
Credentials
No environment variables, credentials, or config paths are requested or required; requested access is proportional to the stated function (analyzing user-provided text).
Persistence & Privilege
always is false and the skill is user-invocable; autonomous invocation is permitted by default but there are no additional privileged settings or persistent installation behaviors requested.
Assessment
This skill appears coherent for reading and explaining insurance policies, but exercise privacy caution: only paste/share the minimum policy text needed (redact sensitive personal identifiers like SSNs, full policy numbers, financial account numbers). Verify summaries against the original document and consult your insurer or a licensed professional for binding interpretations. Note the skill has no published homepage or author information—if you need stronger provenance or guarantees about data handling, prefer a skill or tool from a known provider or one that documents its privacy practices.Like a lobster shell, security has layers — review code before you run it.
latestvk9746t4g6sr1akt8698ydktt91833m7m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
