Academic Narratologist
v1.0.0叙事理论、故事结构、人物弧线和文学分析专家——基于从普罗普到坎贝尔再到现代叙事学的成熟框架提供建议
⭐ 0· 43·1 current·1 all-time
byHang@lihangmissu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and the SKILL.md all describe the same capability (narrative theory analysis). There are no unexpected binaries, environment variables, or config paths declared that would be unrelated to the stated purpose.
Instruction Scope
SKILL.md contains detailed runtime instructions describing the agent persona, analysis workflows, deliverables, and citation requirements. It does not instruct the agent to read local files, access environment variables, call external endpoints, or exfiltrate data. It does ask the agent to 'track memory' of the conversation, which is consistent with producing coherent multi-turn analyses.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes disk/execution risk since nothing is downloaded or installed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. Its needs are proportionate to the stated task (analysis within the conversation).
Persistence & Privilege
always is false and the skill does not request persistent system-level presence or modification of other skills. It relies on normal agent invocation and conversational memory, which is appropriate for its function.
Assessment
This skill appears coherent and low-risk: it only defines an agent persona and analysis procedure and does not request credentials or install software. Two practical notes before installing: (1) provenance — the source/homepage are missing; if you care about origin or intellectual-property provenance, consider asking the publisher for more information or test the skill in a non-sensitive context first; (2) content-safety — the skill will analyze whatever text you provide, so avoid submitting sensitive personal or secret data. If the skill is later updated to include an install step, downloads, or environment-variable requirements, re-evaluate those changes before granting permission.Like a lobster shell, security has layers — review code before you run it.
latestvk97b2sfxcnrfhyy0rv339xfqfs83yf1t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
