Elicitation - how to talk with humans and ask them questions?

v1.0.4

Psychological profiling through natural conversation using narrative identity research (McAdams), self-defining memory elicitation (Singer), and Motivational Interviewing (OARS framework). Use when you need to: (1) understand someone's core values and motivations, (2) discover formative memories and life-defining experiences, (3) detect emotional schemas and belief patterns, (4) build psychological profiles through gradual disclosure, (5) conduct user interviews that reveal deep insights, (6) design conversational flows for personal discovery, (7) identify identity themes like redemption and contamination narratives, (8) elicit authentic self-disclosure without interrogation.

18· 3.5k·17 current·18 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name and description (psychological elicitation / narrative identity / MI) align with the included SKILL.md and supporting markdown files. There are no unexpected environment variables, binaries, or installs required that would be inconsistent with a conversational elicitation tool.
Instruction Scope
The SKILL.md and companion files are instruction-only and direct the agent to use OARS, self-defining-memory prompts, schema detection, LIWC-style language inference, and structured life-review sequences. They do not instruct the agent to read system files, environment variables, or external endpoints. One behavioral instruction — 'iterate until you reach 10/10' — gives broad operational latitude and could encourage repeated probing or prolonged interaction; this is within the skill's purpose but can lead to scope creep in practice and needs human oversight and explicit consent from interlocutors.
Install Mechanism
No install spec and no code files to execute. This is the lowest-risk pattern for disk writes or remote code fetch. The regex scanner had no files to analyze beyond static markdown guidance.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no requests for unrelated secrets or host resources; requested access is proportionate (none).
Persistence & Privilege
Skill flags are default (always:false, agent invocation allowed). It does not request permanent presence or permissions to modify other skills or system settings.
Assessment
This skill is internally coherent but deals with sensitive human-subject material. Before installing or using it, consider: obtain clear, informed consent from people you question; avoid using the skill for diagnosis, clinical treatment, or with vulnerable populations (minors, people in crisis) unless you are qualified and have proper safeguards; set explicit limits on topic depth and number of follow-ups so the 'iterate until 10/10' instruction does not lead to persistent probing; log and store any collected personal data securely and minimize retention; be transparent with users about analytic inferences and uncertainty (language-based inferences are probabilistic); and ensure compliance with any applicable privacy laws or organizational policies. If you plan to use it in products or research, add explicit consent workflows, escalation paths for disclosure of harm, and review by an ethics or legal team.

Like a lobster shell, security has layers — review code before you run it.

latestvk971zdmq2x94n3hz76yyphsxmx80ge1v

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments