Zettelclaw
v2026.3.11Work inside a Zettelclaw vault using the current typed frontmatter schema, inbox + Base workflows, and human-write/agent-read guardrails. Use when creating,...
⭐ 0· 589·4 current·4 all-time
byMax Petretta@maxpetretta
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (vault note management, frontmatter, inbox/Base workflows) matches the SKILL.md. The skill requests no credentials, binaries, installs, or config paths, which is appropriate for an instruction-only vault workflow helper.
Instruction Scope
Runtime instructions are narrowly scoped to reading templates, searching the vault (qmd preferred, rg fallback), and producing or editing notes only when explicitly asked. The SKILL.md explicitly forbids autonomous destructive actions (moving/deleting/changing status without instruction) and limits agent write surface, so the instructions stay within the stated purpose.
Install Mechanism
No install spec and no code files to install; the package.json only advertises the SKILL.md. This minimizes disk-write and supply-chain risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. The SKILL.md references only local vault paths and optional local tools (qmd, rg), which are proportional to its functionality.
Persistence & Privilege
always is false and the skill is user-invocable with normal autonomous invocation allowed. It does not request permanent presence, nor does it instruct modifying other skills or global agent settings (it explicitly warns not to change OpenClaw config unless requested).
Assessment
This skill is instruction-only and appears coherent with its purpose: helping an agent work inside a Zettelclaw vault. Before enabling it, confirm the following: (1) Only grant the agent filesystem access to the intended vault directory (don’t expose unrelated files). (2) If you don’t want the agent to act autonomously, disable autonomous invocation for this skill or require explicit user confirmation for edits. (3) Back up your vault/templates before allowing any automated edits. (4) Note that qmd/rg are optional helpers—the skill will read templates and files in the vault, so verify those files are ones you expect the agent to access. If you want extra assurance, review agent actions on a per-request basis (keep human-in-the-loop for any note creation, renaming, moving, or deletion).Like a lobster shell, security has layers — review code before you run it.
latestvk977h9njwyj7e60gcmw9mgjtd182q601
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
