Reclaim Your Brain

v0.1.0

Transform AI conversations from answer-dispensing to deep learning. Uses Socratic questioning, explain-back verification, progressive disclosure, cognitive l...

0· 233·1 current·1 all-time
byJatin Khatri@jk-0001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name, description, and SKILL.md all describe a tutoring mode (Socratic questioning, explain-back, progressive disclosure). There are no environment variables, binaries, or config paths requested that would be unrelated to a conversational teaching aid.
Instruction Scope
The SKILL.md contains only runtime instructions about dialog style, triggers, and pedagogical techniques. It does not instruct the agent to read files, access environment variables, call external endpoints, or transmit data outside the conversation context.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing will be written to disk or downloaded during install, minimizing surface area.
Credentials
No credentials, API keys, or config paths are required. The skill's functionality (changing conversational behavior) does not justify additional secrets or system access.
Persistence & Privilege
Flags are default (always: false, user-invocable, model invocation allowed). The skill does not request permanent/always-on presence or modify other skills or system-wide settings.
Assessment
This skill is instruction-only and appears coherent with its stated purpose: a Socratic, active-learning conversation style. It does not request credentials or install code, which reduces technical risk. Keep in mind: (1) the skill's source is 'unknown' and there's no homepage or publisher reputation to verify — prefer skills with identifiable authors; (2) because it changes dialog behavior, it may ask for personal examples or context during learning sessions — avoid sharing sensitive personal data; (3) test the skill in a low-risk conversation first to confirm it behaves as described; and (4) if you need stronger assurances, ask the publisher for provenance or a changelog before wider use.

Like a lobster shell, security has layers — review code before you run it.

latestvk974qdmxtgx3nj8n13rst8b48x82d16r

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments