callnote
v1.0.0将医药/医疗行业电话会、策略会、专家会或业绩会的原始转写整理为高完整度、买方/卖方内部常用风格的标准化会议纪要。适用于术语纠错、Q&A重构、关键信息保留、低置信度内容与音频时间点标注。
⭐ 0· 50·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (medical call-note summarization) matches the SKILL.md, templates, and examples. There are no unrelated requirements (no binaries, env vars, or config paths) that would be unexpected for a transcript-to-minutes tool.
Instruction Scope
Runtime instructions are limited to transcript processing: terminology correction, Q&A reconstruction, timestamp annotation for low-confidence segments, and formatting. The guide explicitly forbids fabricating content. It does not instruct reading unrelated files, exfiltrating data, or calling external endpoints.
Install Mechanism
No install spec or code is included (instruction-only), so nothing will be written to disk or fetched at install time. This is the lowest-risk install model.
Credentials
The skill declares no required environment variables, credentials, or config paths. The instructions reference only user-provided inputs (transcripts, term lists, metadata), which is proportionate to its purpose.
Persistence & Privilege
Skill flags show default behavior (always: false). There is no request to modify agent/system settings or other skills. Autonomous invocation is allowed by default on the platform, but that is a platform-level behavior, not a property of this skill.
Assessment
This skill appears coherent and focused on transcript-to-minutes conversion. Before installing or using it, remember: (1) do not upload sensitive patient-identifiable information or other protected health data unless you have proper consent and compliance controls, since the skill processes transcript text; (2) confirm that your agent's ability to call skills autonomously matches your trust model (platform default allows autonomous invocation); and (3) review templates/prompts you supply (term lists, background materials) so they don't accidentally include secrets. No extra credentials or network installs are required by the skill itself.Like a lobster shell, security has layers — review code before you run it.
latestvk974rvv0671crk25dx7rhtj7nx84p55rnotevk974rvv0671crk25dx7rhtj7nx84p55r
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
