Plot Logic Pipeline

v1.0.0

Systematically analyze scientific papers by mapping figures to discussions, identifying logical flow, and tracking evidence sources. Figures are the backbone...

0· 88·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (mapping figures to discussion and tracing argument flow) aligns with the SKILL.md content and templates. The skill does not request unrelated credentials, binaries, or system access.
Instruction Scope
SKILL.md provides prescriptive templates and stepwise analysis instructions limited to examining figures, discussions, and citations. It does not instruct the agent to read system files, steal secrets, or contact external endpoints. The guidance is specific rather than open-ended.
Install Mechanism
No install spec and no code files are present. This is the lowest-risk form: nothing is written to disk or executed by an installer.
Credentials
The skill requests no environment variables, credentials, or config paths. There are no unnecessary or unexplained secrets requested.
Persistence & Privilege
always is false, and the skill does not request permanent presence or system-wide configuration changes. Autonomous invocation is allowed by default but is reasonable for this kind of helper; this combination does not increase concern.
Assessment
This skill is instruction-only and internally consistent with its stated purpose. Before use, consider: (1) if you ask the agent to fetch PDFs or external material, prefer trusted sources (journal sites, your own files) because fetching external URLs introduces network risk outside the skill; (2) review any outputs that quote or reproduce large chunks of paid papers for copyright concerns; and (3) if you later add code or give the agent access to your filesystem/cloud, re-evaluate for scope and credential needs. Overall it appears safe to install from a coherence standpoint.

Like a lobster shell, security has layers — review code before you run it.

latestvk9760cjj7d1rx55rcskg0e3ff583n6r3

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔬 Clawdis

Comments