MeritLoop Architect

v1.0.1

Use this skill when the user wants to design, scope, or refine a Buddhist, spiritual, or cyber-chanting AI product. It is especially useful for local-first r...

0· 172·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (designing Buddhist/cyber-chanting products) match the contents: SKILL.md and reference files are product templates, naming guidance, use-cases and roadmap notes. There are no unrelated requirements (no cloud keys, no unrelated binaries).
Instruction Scope
SKILL.md contains guidance for product design (archetypes, feature modules, safety boundaries). It does not instruct the agent to read host files, access credentials, call external endpoints, or exfiltrate data; mentions of local storage, camera/robot features are conceptual design notes rather than runtime commands.
Install Mechanism
No install spec and no code files to write or run. This is instruction-only, so nothing will be downloaded or installed by the skill itself.
Credentials
No required environment variables, credentials, or config paths are declared. The skill does not request secrets or unrelated service tokens.
Persistence & Privilege
always is false and disable-model-invocation is default; the skill does not request permanent/system-level privileges or modify other skills' configuration. It is a normal, user-invocable skill.
Assessment
This package is an instruction-only product-design template (no code, no installs, no credentials). It appears coherent and safe to install from a permissions standpoint. Before using it in production, consider: (1) this is design guidance not a runtime implementation—any code you build from it may need careful privacy/security reviews (especially if adding camera, microphone, cloud sync, or payments); (2) follow the skill's own caution about avoiding authoritative spiritual claims and get community/temple consultation for cultural sensitivity; (3) if a later version adds network calls or env vars (API keys, payment integrations), review those changes and restrict credentials to the minimal scope required; (4) ensure legal/compliance checks for donation/commerce features.

Like a lobster shell, security has layers — review code before you run it.

buddhismvk972s4xecm2kk86d6d21b1ekjd82rp44latestvk972s4xecm2kk86d6d21b1ekjd82rp44local-firstvk972s4xecm2kk86d6d21b1ekjd82rp44multilingualvk972s4xecm2kk86d6d21b1ekjd82rp44product-strategyvk972s4xecm2kk86d6d21b1ekjd82rp44ritual-techvk972s4xecm2kk86d6d21b1ekjd82rp44

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments