非毒·分析魄

v1.0.0

非毒·分析魄 - 数据洞察与模式识别,让AI像修士一样洞察本质、预知趋势

0· 58·0 current·0 all-time
by无为上人@lt8899789
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description (data insight, pattern recognition, forecasting) align with the SKILL.md content. The skill requests no binaries, env vars, or installs, which is proportionate for a pure instruction/template skill.
Instruction Scope
The SKILL.md provides analysis frameworks, output formats, and example triggers but no concrete commands or data-handling rules. It assumes the agent will process user-provided data (e.g., Excel files) but does not instruct the agent to access system paths, environment variables, or external endpoints. The instructions are high-level and could give an agent broad discretion in how to obtain or enrich data unless other constraints exist.
Install Mechanism
No install spec and no code files — lowest-risk delivery model. Nothing is written to disk and there are no download URLs or package installs to evaluate.
Credentials
No required environment variables, credentials, or config paths are declared. That is consistent with the skill's stated purpose as an instruction-only analytic template.
Persistence & Privilege
always is false and defaults allow autonomous invocation by the agent (platform default). The skill does not request persistent or elevated platform privileges. Note: autonomous invocation is normal; no additional persistence requested.
Assessment
This skill is an instruction/template for data analysis and is internally consistent, but it is high-level and depends on other skills named in the doc (silicon-soul, task-planner, deep-thinking) whose behavior and permissions are unknown. Before installing or invoking: (1) verify what those dependent skills do and whether they request credentials or external network access, (2) be explicit about how the agent should obtain user data (only from attachments the user provides), and (3) avoid submitting sensitive data (passwords, full PII, or secrets) for analysis unless you trust the execution environment and any downstream skills. If you need stricter guarantees, ask the skill author to specify concrete data-handling rules and explicit dependency manifests.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cnkv0p1h4gz0vzmhbebab9s84m23f

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments