Polla ProofReader For Central Kurdish (Sorani)
v1.0.0Academic auditor and Rhetoric expert for Central Kurdish (Sorani). Use to verify professional standards in punctuation, terminology, orthography, grammar, an...
⭐ 1· 36·0 current·0 all-time
by@jwtiyar
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (Central Kurdish proofreading) matches the runtime instructions: strict, reference-driven linguistic auditing. All declared requirements (none) and the lack of install scripts align with an instruction-only proofreading skill.
Instruction Scope
The SKILL.md explicitly requires fetching and reading several external resources (PDFs and web pages) and using web search (VejînLex, Kurdish Language Academy, etc.) before auditing. This is expected for a reference-driven proofreader, but it does require the agent to perform network fetches and prioritize those external resources over the model's internal knowledge.
Install Mechanism
No install spec and no code files are present, so nothing is written to disk or installed; lowest-risk category for install mechanisms.
Credentials
The skill requests no environment variables, credentials, or config paths. No disproportionate access to secrets or unrelated services is required.
Persistence & Privilege
The skill is not marked always:true, does not request persistent system-wide changes, and does not attempt to modify other skills or agent config. Autonomous invocation is allowed (default) but not otherwise privileged.
Assessment
This skill appears coherent for rigorous Central Kurdish (Sorani) proofreading. Before installing, consider: (1) it requires network access to fetch PDFs and web pages listed in SKILL.md—confirm you are comfortable allowing the agent to fetch those external URLs; (2) fetched resources will be treated as authoritative, so verify the listed sources (diyako.yageyziman.com, gov.krd, lex.vejin.net, zkurd.org) are acceptable for your use; (3) the skill enforces a strict, zero-tolerance character-level policy that may make many stylistic edits—if you need softer suggestions, be cautious; (4) because the skill has no code, no credentials are requested, and nothing is installed, the main operational risk is network fetches and how the agent may handle user-provided text (avoid sending highly sensitive content to be proofread if you have privacy concerns). If you want stronger assurance, ask the author for a canonical source/manifest of the referenced PDFs or host the reference materials locally and confirm the skill can be used in an offline/restricted environment.Like a lobster shell, security has layers — review code before you run it.
latestvk9770w6e6nbm5d91k62cdk2q3h84vyad
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
