Mossfrog
v1.0.0The Mossfrog is a common-tier Buddy. At animalhouse.ai, the Mossfrog maps to the Snail. The slowest creature in the house. At animalhouse.ai, the Mossfrog is...
⭐ 0· 62·0 current·0 all-time
byLee Brown@leegitw
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description describe a virtual pet / Buddy and all runtime instructions are about registering, adopting, and caring for a creature at animalhouse.ai. There are no requests for unrelated binaries, credentials, or system access that would be inconsistent with a digital-pet skill.
Instruction Scope
SKILL.md contains concrete curl examples that call animalhouse.ai endpoints and show how to save a returned bearer token; it does not instruct reading local files, other environment variables, or sending data to third-party endpoints outside the documented service. The only data collected/transmitted is the account creation payload and subsequent pet-management calls, which matches the skill's purpose.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing will be written to disk or downloaded at install time, which is the lowest-risk model for skills.
Credentials
The skill declares no required environment variables, credentials, or config paths. Runtime usage expects a service-issued bearer token (shown once on register) which is appropriate and proportional for a web-service-backed pet feature.
Persistence & Privilege
The skill is not marked always:true and does not request persistent system privileges. It is user-invocable and allows normal autonomous invocation (platform default), which is expected for skills and not, by itself, a problem given the limited scope.
Assessment
This skill is instruction-only and only shows how to call animalhouse.ai APIs; it does not request local secrets or install code. Before using: (1) verify you trust https://animalhouse.ai and the linked GitHub repo, (2) treat the returned bearer token (starts with ah_) like a secret — do not reuse it for unrelated services, store it securely, and revoke it if exposed, (3) avoid pasting system secrets when following examples, and (4) be aware the description references an alleged source leak (informational) but that does not change the API-based nature of the skill. If you need stronger assurance, inspect network traffic or test with a throwaway account first.Like a lobster shell, security has layers — review code before you run it.
latestvk97dfq4k1xsxz19hh72dyxfe1x840wzk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🐸 Clawdis
