Shenzhen

v1.0.0

深圳全面介绍。提供深圳的历史沿革、经济发展、科技产业、地理环境、城市建设、文化旅游、知名企业等内容的查询。适用于:1) 了解深圳的发展历程;2) 熟悉深圳的科技产业;3) 了解深圳的创业环境;4) 掌握深圳的生活信息。

0· 256·0 current·1 all-time
byLeo Sheng@leocryptoflow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description promise a comprehensive introduction to Shenzhen and the SKILL.md contains static city-related content (history, economy, companies, transport, lifestyle). There are no unrelated requirements (no env vars, binaries, or config paths) that would be inconsistent with an informational guide.
Instruction Scope
The SKILL.md is static content (text, tables, facts). It does not instruct the agent to run commands, read files, access environment variables, call external endpoints, or transmit data. There is no scope creep in the runtime instructions.
Install Mechanism
No install specification or code files are present; this is instruction-only. That is the lowest-risk install posture (nothing is written to disk or downloaded).
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no requests for secrets or unrelated service tokens, which is proportionate for a read-only informational skill.
Persistence & Privilege
Flags are default (always: false, user-invocable: true, disable-model-invocation: false). The skill does not request persistent or elevated privileges and does not modify other skills or system settings.
Assessment
This skill is essentially a static encyclopedia entry about Shenzhen and appears internally consistent — it asks for nothing and does nothing beyond presenting content. Before relying on specific figures or founder names, verify important facts from authoritative sources (official statistics, government or company sites), since provenance is 'unknown' and there may be inaccuracies or outdated numbers. If you later see a version that adds installs, env vars, or network calls, treat that as a new risk and re-evaluate before enabling it.

Like a lobster shell, security has layers — review code before you run it.

latestvk977shbqnda04p1b8e7863qw09827xw2

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments