Bytedance

v1.0.0

字节跳动全面介绍。提供字节跳动的发展历史、产品矩阵、核心算法、企业文化、全球化布局、营收数据等内容的查询。适用于:1) 了解字节跳动的发展历程;2) 熟悉字节跳动的产品生态;3) 了解字节跳动的推荐算法;4) 掌握字节跳动的商业模式和出海战略。

0· 321·0 current·1 all-time
byLeo Sheng@leocryptoflow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description promise an overview of ByteDance; the SKILL.md is a self-contained, topical document providing that overview. The skill requests no binaries, env vars, or configs that would be unrelated to its stated purpose.
Instruction Scope
SKILL.md contains static content and guidance only—no commands to run, no file reads, no external endpoints, and no instructions to access credentials or system state. It stays within the stated informational scope.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing will be downloaded or written to disk by an installer, so installation risk is minimal.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate credential or secret access for the described functionality.
Persistence & Privilege
always is false and there is no request to modify agent/system configuration or other skills. Default autonomous invocation is permitted by platform but does not raise concern here given the skill's static informational nature.
Assessment
This skill is essentially a static encyclopedia entry about ByteDance and appears coherent and low-risk. Before installing, consider: 1) the content may be out of date or contain inaccuracies—verify important facts against primary sources; 2) there is no source/homepage or author listed, so if provenance matters to you, prefer skills backed by known publishers; and 3) because it’s instruction-only and requests no secrets or installs, it does not introduce credential or install-time risks. If you need up-to-the-minute financials or regulatory status, query official filings or trusted news sources instead.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c4vrtwc34yf80wbhxydyhyh827ert

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments