伏矢·路径魄
v1.0.0伏矢·路径魄 - AI任务规划与策略拆解,让AI像修士一样精准规划、执行、复盘
⭐ 0· 56·0 current·0 all-time
by无为上人@lt8899789
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (task planning, decomposition, optimization) matches the SKILL.md content. No binaries, env vars, or config paths are requested that would be unrelated to planning.
Instruction Scope
SKILL.md contains only planning, decomposition, scheduling, progress-tracking instructions. One guideline — “主动规划 (proactively plan without waiting for user prompts)” — nudges autonomous proactive behavior; this is coherent for a planner but expands runtime autonomy and may lead the agent to propose or take steps without additional user confirmation. The document does not instruct the agent to read local files, network endpoints, or secret stores.
Install Mechanism
No install spec and no code files; lowest-risk form (instruction-only). Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths. It lists other '依赖技能' (silicon-soul, deep-thinking, first-principles-decomposer); those dependent skills are not present here and could themselves request credentials or privileges — you should review them before enabling the combined capability.
Persistence & Privilege
always is false and there is no request to modify system or other skill configurations. Autonomous invocation is allowed by platform default; the skill's proactive guidance increases likelihood of autonomous activity but by itself does not request elevated persistence.
Assessment
This skill is instruction-only and appears coherent for task planning. Before installing: (1) review any referenced dependent skills (silicon-soul, deep-thinking, first-principles-decomposer) because they may request credentials or more privileges; (2) consider whether you want the agent to 'proactively plan' (it may propose actions without extra prompts); (3) test the skill in a controlled context to confirm it does not attempt network I/O or access files you don’t intend to share. If you need higher assurance, ask the publisher for the dependent-skill manifests or an explicit statement about external network calls and credential usage.Like a lobster shell, security has layers — review code before you run it.
latestvk9721absa815neet57gvh6vyfx84mqxg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
