Chain of Density

v1.1.0

Iteratively densify text summaries using Chain-of-Density technique. Use when compressing verbose documentation, condensing requirements, or creating executive summaries while preserving information density.

1· 1.5k·3 current·3 all-time
byVaskin Kissoyan@killerapp
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (densify summaries) matches the contents: an orchestration SKILL.md describing iterative passes plus a small deterministic text_metrics.py used to enforce word counts. Nothing requested (no env, binaries, or installs) appears unrelated to the stated purpose.
Instruction Scope
Instructions are narrowly scoped to running 5 serial 'cod-iteration' passes, passing the source text each iteration, and parsing a 'Missing_Entities:' line. This is coherent with the method, but it does require sending the full source text to the subagent/LLM each iteration (privacy/data-exposure consideration). No instructions reference unrelated files, system paths, or external endpoints.
Install Mechanism
No install spec is present (instruction-only); the included Python script is small, deterministic, and can be run locally. No remote downloads or archive extraction are required.
Credentials
The skill declares no environment variables, credentials, or config paths. There are no unexpected credential requests in the SKILL.md or the script.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes or access to other skills' configs. The skill can be invoked normally by the agent without elevated privileges.
Assessment
This skill appears coherent and low-risk: it only bundles an orchestration guide and a tiny word-count script. Before installing, consider: (1) Source privacy — the method explicitly sends the full source text to successive subagent/LLM calls, so don't run it on confidential material unless your environment/model policy permits it. (2) Output tradeoffs — forcing identical word counts across iterations can produce dense but potentially opaque summaries (already noted by the author for legal/spec texts). (3) Verify runtime environment if you plan to execute the included script (Python 3.10+). The skill has no hidden network calls, secrets requests, or install downloads.

Like a lobster shell, security has layers — review code before you run it.

latestvk9732dp8hap47jbahsjwxcncbs80n6n8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments