RAG Engineer

v1.0.0

Expert in building Retrieval-Augmented Generation systems. Masters embedding models, vector databases, chunking strategies, and retrieval optimization for LL...

0· 735·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description promise an expert RAG role and the SKILL.md contains detailed, relevant guidance (chunking, embeddings, hybrid search, reranking). There are no unrelated requirements (no unexpected env vars, binaries, or config paths).
Instruction Scope
The instructions are advisory text and recommended patterns/anti-patterns. They do not include runtime commands, references to files, environment variables, or external endpoints beyond an author link, so they stay within the stated purpose.
Install Mechanism
There is no install spec and no code files. Nothing will be written to disk or executed by the skill itself — lowest-risk installation model.
Credentials
The skill requests no environment variables, credentials, or config paths. This is proportional to an instruction-only, advisory RAG role.
Persistence & Privilege
always is false and autonomous invocation is allowed by default (normal). The skill does not request persistent system presence or modify other skills or system settings.
Assessment
This skill is an instruction-only RAG guide and is internally consistent and low-risk: it asks for no credentials and installs nothing. Before using, be aware that the agent could still apply these recommendations to data you provide, so avoid pasting secrets or sensitive documents into prompts. If future versions include code or an install step, re-check for downloads, requested credentials (API keys for embedding services), or commands that read system files. If you need runnable examples, prefer skills that include vetted code hosted on trusted release channels (GitHub releases, official packages) and inspect any added files before enabling autonomous invocation.

Like a lobster shell, security has layers — review code before you run it.

latestvk972fkxrssmpgcmy7s16yzf7c18166sq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments