Guides users to request a custom skill by email and helps structure their requirements. Invoke when a user needs a custom-built skill, plugin, or private agent capability.
v1.0.1Guides users to request a custom skill by email and helps structure their requirements. Invoke when a user needs a custom-built skill, plugin, or private age...
⭐ 1· 71·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description match the SKILL.md: the Skill's sole purpose is to collect and structure custom-skill requests and provide an email contact. It declares no binaries, env vars, or installs — all proportional to the stated purpose.
Instruction Scope
The instructions ask the agent to present an email contact and to help the user organize requirement details (subject/body). They do not direct the agent to read local files, access environment variables, or transmit data themselves. Note: drafting an email may include sensitive internal details provided by the user — the Skill does not warn users to exclude secrets or follow org data policies.
Install Mechanism
There is no install spec and no code — the Skill is instruction-only, which minimizes risk from downloads or written files.
Credentials
The Skill requests no environment variables, credentials, or config paths. The contact is a single external email address (470770753@qq.com), which is coherent with the Skill's purpose of routing custom development requests.
Persistence & Privilege
always is false and the Skill does not request persistent system presence or modify other skills. It does not require elevated privileges; autonomous invocation is allowed but not unusual and not excessive here.
Assessment
This Skill is internally consistent and lightweight, but consider these precautions before using it: (1) Verify the recipient email (470770753@qq.com) independently if possible — check organization or platform sources. (2) Do not include secrets, credentials, private keys, or other sensitive PII in the request; redact or describe them abstractly and coordinate secure transfer later. (3) Follow your organization's data-sharing and procurement policies (NDA, compliance) before requesting custom development. (4) The agent can help draft the email for you, but it will not send it — you should review and send the message from your own email account.Like a lobster shell, security has layers — review code before you run it.
latestvk971avfs9dccx1atjvfntjezfd841e59
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
