Monero Privacy Features
v1.0.0Explains Monero's privacy features including ring signatures, stealth addresses, RingCT, Kovri/I2P, Dandelion++, and Bulletproofs.
⭐ 0· 88·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (explaining Monero privacy features) matches the content of SKILL.md. The skill requests no binaries, env vars, or installs—consistent with a read-only educational guide.
Instruction Scope
SKILL.md contains explanatory text and links but does not instruct the agent to read local files, access unrelated environment variables, call external endpoints, or exfiltrate data. The only actionable element is a suggested voluntary donation address in the doc.
Install Mechanism
No install spec and no code files — lowest-risk instruction-only footprint. Nothing is written to disk or executed by an installer.
Credentials
The skill declares no credentials or config access (appropriate). It does include a Monero donation address in the content; this is consistent with an author soliciting voluntary tips, but users should verify the address before sending funds.
Persistence & Privilege
Flags are default (always: false, model invocation allowed). The skill does not request persistent privileges or change other skills' configs.
Assessment
This skill is an offline, read-only explanation of Monero privacy features and appears internally consistent. Before installing: (1) note there is no code or installer so it cannot run actions on your system, (2) verify any external links (SKILL.md contains malformed 'https://ww.getmonero.org' links that should be 'https://www.getmonero.org'), and (3) do not send funds to the included Monero address unless you independently verify it belongs to a trusted recipient. Because the skill can be invoked autonomously by agents by default, be mindful of how you let agents use it, but there are no credentials or network calls required by the skill itself.Like a lobster shell, security has layers — review code before you run it.
latestvk97cmtwn9khvwd7g1kq9xc2m7x83480m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
