input classification

v1.0.0

Deterministic rule-based system for classifying clarified input into a single primary task category and assigning execution complexity. Use when the Main Age...

0· 456·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (rule-based input classification) matches the SKILL.md and reference documents. No binaries, env vars, or installs are requested and the documented downstream/upstream integrations (clarification, decomposition, human review) are appropriate for a classification component.
Instruction Scope
Instructions are narrowly scoped to classification, confidence, risk, and routing and explicitly forbid decomposition or execution. However the skill requires logging of 'full context' and forwarding clarified_input to downstream systems; that can expose sensitive content (clarified_input/original_input). The docs do not specify redaction, encryption, or privacy controls for logs or downstream payloads.
Install Mechanism
This is an instruction-only skill with no install spec or code files to write/execute. That minimizes installation risk.
Credentials
The skill requests no environment variables, credentials, or config paths. All required fields are inline in the documentation and proportional to the classification purpose.
Persistence & Privilege
always:false and default autonomous invocation are set to normal. The skill does not request persistent presence or modify other skills. It does define logging and retention policies, which are behaviorally significant but not a platform privilege request.
Assessment
This skill appears internally consistent and fits its stated purpose, but review a few operational details before installing: - Data privacy: the skill logs 'full context' and forwards clarified_input/original_input to downstream systems. Confirm where logs and downstream queues are stored, who can access them, and whether inputs may contain PII or secrets. Ask whether logs are encrypted, whether inputs are redacted or hashed (and if hashes are salted) before long-term retention. - Retention and audit: the documentation prescribes multi-tier log retention (DEBUG 7d ... AUDIT 2y). Ensure those retention policies align with your data governance and that audit logs do not retain sensitive content longer than allowed. - Integration endpoints and authorization: the SKILL.md references JSON handoffs to Clarification, Task Decomposition, Human Review, and queues. Confirm the actual endpoints, authentication, and transport security used in your deployment so classification results are not leaked to unauthorized systems. - Behavior guarantees: the skill claims deterministic 100% single-category classification and tight latency (<100ms). Those are strong guarantees — validate on representative inputs (including ambiguous/edge cases) to ensure the tie-breaking/escalation behavior works as intended and does not produce forced misclassifications. - Escalation and human review: confirm human-review workflows and who can override classifications; verify audit trails record overrides as specified. If these operational questions are answered satisfactorily (privacy controls, secure endpoints, and realistic performance expectations), the skill is appropriate to install. If you cannot confirm log handling or downstream endpoints, treat the integration as a potential privacy risk and seek remediation before enabling it.

Like a lobster shell, security has layers — review code before you run it.

latestvk97a8bj56cjtjnbrh53cn7shkn81mf9r

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments