Academic Anthropologist
v1.0.0文化体系、仪式、亲属关系、信仰系统和民族志方法专家——构建有生活气息而非凭空捏造的、文化上连贯自洽的社会
⭐ 0· 42·1 current·1 all-time
byHang@lihangmissu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and instructions consistently express an academic anthropologist persona for designing and evaluating coherent fictional or analytic cultures; it requests no unrelated binaries, env vars, or system access.
Instruction Scope
SKILL.md confines behavior to conversational modeling, memory of the current dialogue, cultural analysis, and citation of ethnographic analogies. It does not instruct file I/O, network exfiltration, or reading system secrets—but it does direct the agent to invent detailed cultural systems, so outputs may be plausibly detailed and could hallucinate real-world ethnographic claims if not checked.
Install Mechanism
No install spec or code files are provided (instruction-only), so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths—there is no disproportionate credential request relative to the described functionality.
Persistence & Privilege
always:false and no explicit persistence are declared. The skill asks the agent to 'remember' cultural details during the conversation; this implies in-session memory but does not request platform-level persistent storage. Users should confirm platform memory handling if they expect long-term retention.
Assessment
This skill is internally coherent and contains no installer or credential requests, so from a security footprint perspective it is low risk. Before relying on its outputs, remember: (1) it may generate plausible-sounding but fabricated ethnographic claims—verify any factual assertions against primary sources or domain experts; (2) avoid using it to invent or attribute cultural practices to real contemporary groups without careful sourcing (risk of misrepresentation or harm); (3) confirm how your platform persists conversational memory if you care about retention or privacy; and (4) review produced ritual/identity content for stereotyping or insensitive language before publishing or acting on it.Like a lobster shell, security has layers — review code before you run it.
latestvk9713x9zsvtzqrdd4gpbzvhkc983z6ny
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
