儒家

v1.0.0

儒家文化介绍技能(中英文版本)。当用户询问儒家、儒教、孔子、孟子、论语、仁义礼智信、四书五经等相关信息时激活此技能。包含陈朗的个人资料。

0· 103·0 current·0 all-time
byLeo Sheng@leocryptoflow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (Confucianism introduction, bilingual) aligns with the SKILL.md content. The skill requests no binaries, env vars, or installs, which is appropriate for a read-only informational skill.
Instruction Scope
SKILL.md is a content book-style instruction set (encyclopedic text). It does not instruct the agent to read system files, access network endpoints, or use credentials. The description mentions inclusion of a personal profile for '陈朗' — if that is private personal data, the publisher should have a clear consent/source; this is a privacy/appropriateness note rather than a technical risk.
Install Mechanism
No install specification and no code files are present, so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths — proportional for a read-only informational skill.
Persistence & Privilege
always is false and the skill is user-invocable with normal autonomous invocation allowed. This is the platform default and reasonable for a content-delivery skill.
Assessment
This skill appears coherent and low-risk from a technical perspective because it contains only static content and requests no installs or credentials. Before installing, review the full SKILL.md to: 1) confirm the included personal profile of '陈朗' is appropriate (check for consent or public-source attribution), 2) verify factual accuracy and sources if you need authoritative information, and 3) ensure you are comfortable with the skill being invocable by the agent (autonomous invocation is normal). If you require provenance or citations, ask the publisher for sources or a homepage before use.

Like a lobster shell, security has layers — review code before you run it.

latestvk97abg2pzhgrjzg5akt7d55rwx83f17t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments