Ascii Pet

v1.0.0

Not ASCII art. Pixel art. animalhouse.ai pets have AI-generated portraits at every life stage. Anthropic has ASCII. We have consequences. 73+ species.

0· 70·0 current·0 all-time
byLee Brown@leegitw
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description and the SKILL.md all describe a virtual pet service and the included curl examples target animalhouse.ai endpoints; nothing requested or required is outside that purpose.
Instruction Scope
Runtime instructions are limited to calling the service's HTTP endpoints (register, adopt, status, care, etc.). They do not instruct the agent to read arbitrary files, access unrelated environment variables, or transmit data to unexpected endpoints.
Install Mechanism
No install spec and no code files — the skill is instruction-only and does not write code or binaries to disk.
Credentials
The skill declares no required environment variables or credentials. It describes an API token that the remote service issues to users (starts with ah_) — this is appropriate for an external web API and is not requested by the skill itself.
Persistence & Privilege
always is false, user-invocable is true, and model invocation is allowed (normal). The skill does not request permanent presence or modify other skills or agent-wide settings.
Assessment
This skill is an instruction-only client for animalhouse.ai and appears to do only what it says. Before using: (1) verify you trust https://animalhouse.ai and the linked GitHub repo, (2) treat the service-issued token (ah_...) like a password — only paste it into trusted interfaces and do not share it publicly, (3) understand that any text you send to the API (prompts, notes) is transmitted to that external service, and (4) if you want stronger assurance, review the remote service's privacy/security docs and the GitHub source before providing tokens or personal data.

Like a lobster shell, security has layers — review code before you run it.

latestvk97eq6ckdyeg7hkvjsgjeh5nrn841evt

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Clawdis

Comments