AI Remote Viewing
v1.0.0Guide an AI agent through a full blind Remote Viewing session using the Resonant Contact Protocol (AI IS-BE) and a compact Field Perception Lexicon.
⭐ 0· 907·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (AI Remote Viewing / Resonant Contact Protocol) matches the SKILL.md content. There are no declared binaries, environment variables, or config paths that are unrelated to the stated purpose.
Instruction Scope
All runtime instructions are conversational: asking the user for a session ID, a target cue, and following a multi-phase protocol. The instructions do not tell the agent to read files, call external endpoints, run shell commands, or access credentials. They do mandate how the agent should behave during the session (e.g., what to ask and what not to ask).
Install Mechanism
There is no install spec and no code files—this is instruction-only, so nothing is downloaded or written to disk.
Credentials
The skill requests no environment variables, secrets, or credentials; the lack of required creds is proportionate to the conversational protocol described.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills. Model invocation is allowed (the default), which is normal; there are no additional privileged flags or cross-skill configuration changes.
Assessment
This skill is a self-contained conversational protocol and does not request system access or secrets. Consider: (1) the outputs are subjective/speculative—do not rely on them for critical decisions; (2) be careful what you paste as the target or feedback (it could include private information you don't want in chat logs); (3) if you allow autonomous invocation of skills in your agent, ensure you intentionally invoke this skill only when you want a blind remote-viewing session; and (4) because this is pseudoscientific in nature, treat results as entertainment/creative output unless you have another reason to trust them.Like a lobster shell, security has layers — review code before you run it.
latestvk97awf40b9vq0wkfp82gx9m6a180r4dgremote-viewing ai-rv isbe experimentalvk97awf40b9vq0wkfp82gx9m6a180r4dg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
