Intelligent Continuous Requirements Analysis v4

v4.1.0

通过AI辅助捕获、澄清、智能发散收敛、技术评审、测试验证等闭环,实现需求的持续演化和高效管理。

0· 72·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (continuous requirements analysis) match the SKILL.md content: methodology, templates, process stages, and AI-assisted checkpoints. The skill does not request unrelated binaries, credentials, or installs.
Instruction Scope
SKILL.md is a comprehensive methodological guide (templates, stage descriptions, checks). It suggests scanning historical project data, integrating with DevOps/Living Requirements, and running AI-assisted analyses, but does not include concrete commands, file paths, or automatic data-exfiltration steps. If a user later connects this guidance to automated tooling (logs, repos, CI/CD), those integrations — not this skill — would need credentials and access; the skill itself does not perform those actions.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be written to disk or downloaded by the skill as provided.
Credentials
The skill declares no required environment variables, credentials, or config paths. Some recommended integrations (DevOps, scanning historical data) imply that additional permissions would be necessary if the user wires this into automation, but those are not requested by the skill itself.
Persistence & Privilege
Skill is not always-on and is user-invocable. It does not request elevated platform privileges or modify other skills' configurations as provided.
Assessment
This skill is a document of best practices and templates for continuous requirements engineering — it contains no code or hidden network calls. Before you wire it into automation: (1) be cautious about granting any external tooling (CI/CD, repos, logs) access tokens — follow least-privilege principles; (2) validate any AI outputs manually (the skill itself emphasizes human-in-the-loop); (3) if you convert these instructions into automated agents or scripts, review those scripts for credential handling and network endpoints, since those actions would introduce new risks not present in this instruction-only skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk9701s6fkdkw3f0ab2k1rhb9hx8402yw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments