Openclaw Echo Agent

v0.1.0

Processes text input using a tool to return deterministic output, serving as a reference example for OpenClaw agent development.

1· 1.8k·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The SKILL.md describes a minimal echo/reference agent and requests no binaries, env vars, or installs — that is coherent. However the file claims an entry point named 'agent.py' which is not present in the package; this mismatch indicates the skill is incomplete or misdeclared.
Instruction Scope
The instructions are very short and do not ask the agent to read files, credentials, or external endpoints (good). They are also vague — e.g., 'Uses a tool to process it' without specifying what tool — leaving unspecified behavior that should be clarified before trusting execution.
Install Mechanism
No install spec and no code files are present. That minimizes risk from downloads or on-disk installs, but also means there is nothing to execute locally as provided.
Credentials
The skill declares no required environment variables, credentials, or config paths; this is proportionate for an echo/reference example.
Persistence & Privilege
Default runtime flags (not always-enabled, agent invocation allowed) are used. There is no request for persistent or elevated privileges in the metadata.
What to consider before installing
This package looks like a skeleton/reference but is incomplete: it declares an entry point (agent.py) that is not included and the runtime instructions are vague about what 'tool' it uses. Do not install or enable it expecting runnable functionality. Ask the publisher for the missing code (agent.py) or a corrected package listing and for clarification of what external tool or dependency the skill invokes. If you must test it, do so in an isolated environment and avoid granting any credentials until the skill's behavior and code are visible.

Like a lobster shell, security has layers — review code before you run it.

latestvk971f8pkm8kdw8fp6v1seqw2j9809262

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments