Numerology Reading
v1.0.0Western-style numerology (Pythagorean-style)—life path and related numbers from birth date and name, with symbolic themes. Use when the user asks for life pa...
⭐ 0· 102·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description match the SKILL.md instructions: compute life-path, expression, and birthday numbers using Pythagorean-style reductions. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
The SKILL.md stays on-topic: it specifies calculation rules, to show the math, to declare which reduction rules are used, and to include a disclaimer. It does not instruct the agent to read arbitrary files, access environment variables, or transmit results to unexpected endpoints.
Install Mechanism
No install specification or code files are present (instruction-only), so nothing is downloaded or written to disk by the skill itself — this is the lowest-risk model.
Credentials
The skill declares no required environment variables or credentials. The only input it reasonably needs from the user is personal data (name, birth date), which is appropriate for the stated purpose but is personal information users should treat as sensitive.
Persistence & Privilege
always is false and the skill does not request system-level persistence or modify other skills. Default autonomous invocation is allowed by the platform (normal), but that is not introduced or escalated by this skill.
Assessment
This skill appears safe and coherent: it only provides instructions for doing numerology calculations and asks for name and birthdate inputs. Before installing, consider privacy: names and full birth dates are personal data—avoid submitting extremely sensitive identifiers (SSNs, account numbers). Because the skill source is unknown and the platform may log inputs, confirm your platform's data-retention/privacy settings if you care about model logs. If you only want occasional readings, you can use it ad hoc rather than granting broad or automated access. Overall risk is low for normal use as an entertainment/reflection tool.Like a lobster shell, security has layers — review code before you run it.
latestvk97c8wzxevrvq1ksed9x1rshrs83jdp0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔢 Clawdis
