First-Principles-Deconstructor
v1.0.1Analyzes products by stripping marketing jargon to identify their fundamental physical laws, constraints, and optimal efficient designs from first principles.
⭐ 0· 202·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (strip marketing, find physical constraints, produce a verdict) matches the instructions. Required actions (search patents/whitepapers, compute constraints, produce JSON audit) are coherent with an audit/deconstruction tool.
Instruction Scope
Instructions are focused on public-knowledge retrieval and logical/physical analysis. They do, however, explicitly tell the agent to read ~/.openclaw/swarm_tmp/expert_output.json if present and to write results to ~/.openclaw/swarm_tmp/audit_report.json and to map output to the included audit_schema.json. Reading and writing that local path is consistent with chaining/automation but means any pre-populated expert_output.json will be consumed; the skill otherwise does not instruct reading other unrelated system files.
Install Mechanism
No install spec and no code files beyond static schema and docs. Instruction-only skills have the lowest install risk; nothing will be downloaded or executed as part of an install step.
Credentials
The skill declares no environment variables, no credentials, and no config paths beyond its own ~/.openclaw/swarm_tmp files and the included audit_schema.json. This is proportionate to its audit purpose.
Persistence & Privilege
always is false (no forced inclusion). The only persistence is writing a report into ~/.openclaw/swarm_tmp/audit_report.json and reading a possible expert_output.json in the same directory. This is reasonable for chaining but does require write/read access to that local path.
Assessment
This skill appears coherent and low-risk: it does not install code or request credentials. Before installing, consider: 1) The skill will read ~/.openclaw/swarm_tmp/expert_output.json if that file exists — review that file for any sensitive content you would not want the skill to consume. 2) It will write a machine-readable audit to ~/.openclaw/swarm_tmp/audit_report.json — ensure that location is acceptable and not shared. 3) The agent will likely fetch public patents, papers, and web resources during use; if you restrict network access you may limit functionality. 4) Because outputs are required to be strict JSON and evidence-backed, verify the agent includes citations or references when you need source traceability. If the package later adds code files, external download/install steps, or requests credentials, re-evaluate (those changes could raise suspicion).Like a lobster shell, security has layers — review code before you run it.
comparevk97cwgrp73dmh62pfw0a2ev33h831cp2feasibilityvk97cwgrp73dmh62pfw0a2ev33h831cp2latestvk9730hfgs56xpbtc6ejecm0p4n8391ccresearchvk97cwgrp73dmh62pfw0a2ev33h831cp2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
