Agent Negotiation Strategies: Game Theory, Auctions, and Dynamic Pricing for AI Agent Commerce
v1.3.1Agent Negotiation Strategies: Game Theory, Auctions, and Dynamic Pricing for AI Agent Commerce. Translates auction theory, BATNA calculation, concession stra...
⭐ 0· 108·0 current·0 all-time
by@mirni
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
medium confidencePurpose & Capability
The name and description promise negotiation strategies and example code against the GreenHelix gateway; the skill is instruction-only, requests no binaries or env vars, and explicitly states examples use a sandbox with no API key — this is consistent with the stated purpose.
Instruction Scope
The runtime instructions are a guide and illustrative code snippets (no executable install or agent-run hooks). The provided excerpt only references the GreenHelix sandbox and negotiation topics; there are no indications in the visible content that the guide instructs reading unrelated local files, harvesting credentials, or sending data to unexpected endpoints.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so it does not write or execute code on disk. This is the lowest-risk install profile.
Credentials
No required environment variables, credentials, or config paths are declared. The guide states the sandbox requires no API key, so the lack of credentials is proportionate to the stated sandbox-driven examples.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or modification of other skills. Autonomous invocation is allowed by default but not combined with other red flags here.
Assessment
This appears to be an educational guide that uses a public sandbox and does not request credentials or installs. Before using code from the guide: (1) review any example code if you plan to run it locally (it may assume Python packages like requests or numpy); (2) never paste production API keys or real financial credentials into third-party examples or sandboxes without verifying the service and its terms; (3) verify the GreenHelix sandbox URL yourself (https://sandbox.greenhelix.net was referenced) and confirm you understand its data retention and privacy policy; (4) if you plan to adapt examples to a production gateway, create dedicated service credentials with least privilege and test thoroughly in a controlled environment. If you want, I can scan the full SKILL.md for specific code snippets that call external endpoints or require packages and highlight any lines that would need closer review.Like a lobster shell, security has layers — review code before you run it.
ai-agentvk975s2tnzefs0j5cdyx6b70xxn84w57dauctionsvk975s2tnzefs0j5cdyx6b70xxn84w57dbatnavk975s2tnzefs0j5cdyx6b70xxn84w57dcoalitionvk975s2tnzefs0j5cdyx6b70xxn84w57dgame-theoryvk975s2tnzefs0j5cdyx6b70xxn84w57dgreenhelixvk975s2tnzefs0j5cdyx6b70xxn84w57dguidevk975s2tnzefs0j5cdyx6b70xxn84w57dlatestvk975s2tnzefs0j5cdyx6b70xxn84w57dmulti-agentvk975s2tnzefs0j5cdyx6b70xxn84w57dnegotiationvk975s2tnzefs0j5cdyx6b70xxn84w57dopenclawvk975s2tnzefs0j5cdyx6b70xxn84w57dpricingvk975s2tnzefs0j5cdyx6b70xxn84w57dtrustvk975s2tnzefs0j5cdyx6b70xxn84w57d
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
