Article Rewriter
v1.0.0Rewrite and restructure articles, newsletters, threads, scripts, landing pages, and rough notes into clearer, more engaging, more persuasive writing. Use whe...
⭐ 0· 212·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the content of SKILL.md and the included APAG playbook. The skill does not request unrelated binaries, env vars, or config paths.
Instruction Scope
Runtime instructions are focused on rewriting tasks (structure, hooks, CTAs) and include guardrails (don't fabricate facts). They ask the agent to request source text when missing and to consult the included reference file; they do not read or transmit unrelated system files or external endpoints.
Install Mechanism
No install spec or code files — instruction-only. Nothing will be downloaded or written to disk by the skill itself.
Credentials
No environment variables, credentials, or config paths are required. Requested access is proportional to the stated purpose.
Persistence & Privilege
always is false and the skill does not request system-wide modifications. disable-model-invocation is false (default) which allows autonomous invocation but is normal and not combined with other red flags.
Assessment
This is an instruction-only article-rewriting skill that requires no installs or credentials and behaves as described. Before using: (1) Avoid submitting highly sensitive or private data—while the skill itself has no exfiltration hooks, outputs should be treated like any LLM result and verified; (2) Review rewrites for factual accuracy (the skill forbids fabrication but LLMs can still hallucinate); (3) Note the agent may invoke the skill autonomously by default (normal), so if you prefer explicit control check your agent's autonomy settings; (4) If you need privacy guarantees or retention policies, confirm those at the agent/platform level since the skill bundle contains no policy statements.Like a lobster shell, security has layers — review code before you run it.
latestvk97200fw4p4ret9sw5ke1626px82r511
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
