toc-generator

v1.0.1

When the user wants to add, optimize, or audit table of contents (TOC) for long-form content. Also use when the user mentions "TOC," "table of contents," "ta...

0· 113·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the runtime instructions: the SKILL.md describes how to build, place, and optimize TOCs and related HTML/ARIA/SEO guidance. No unrelated binaries, credentials, or installs are requested.
Instruction Scope
Runtime instructions are scoped to TOC creation and best practices. It asks the agent to read .claude/project-context.md or .cursor/project-context.md if present to gather content structure — this is relevant and proportional to generating an accurate TOC. The skill does not instruct broad file system reads, network exfiltration, or use of unrelated env vars.
Install Mechanism
No install spec and no code files — instruction-only. That minimizes disk writes and execution of third-party code.
Credentials
No environment variables, credentials, or config paths are required. The only file access it suggests (project-context files) is directly relevant to its purpose.
Persistence & Privilege
always:false (default); user-invocable and allowed autonomous invocation — normal for skills. It does not request persistent presence or modify other skills or system-wide settings.
Assessment
This skill is instruction-only and appears coherent for TOC generation. Before installing, confirm you are comfortable allowing the agent to read project context files (it specifically references .claude/project-context.md and .cursor/project-context.md). Because there is no install step or required credentials, the immediate risk is low — but watch for future versions that add an install spec, external downloads, or requests for tokens/credentials. If you only want occasional use, keep it user-invocable rather than enabling always-on access.

Like a lobster shell, security has layers — review code before you run it.

latestvk97afh679ym1qmq9wvjx7bsy8x83whxw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments