AI Paragraph Rewriter
v1.0.0Rewrite paragraphs to sound natural and human-written, bypassing AI detectors (GPTZero, Turnitin, Originality.ai).
⭐ 0· 47·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (rewrite to bypass AI detectors) match the SKILL.md: all runtime instructions describe rewriting modes and heuristics for evasion. There are no unrelated environment variables, binaries, or install steps requested.
Instruction Scope
The instructions stay within the stated purpose (identify AI markers, perform Light/Medium/Bypass rewrites). However, 'Bypass' mode explicitly directs heavy rewriting and adding 'concrete details' or first-person voice, which can encourage fabrication of facts and make outputs misleading or dishonest. This is a content-integrity and ethical risk rather than a technical incoherence.
Install Mechanism
No install spec or code files — the skill is instruction-only, so nothing is written to disk and no external packages or downloads are requested.
Credentials
The skill declares no required environment variables, credentials, or config paths and the SKILL.md does not ask for access to any unrelated secrets or system files.
Persistence & Privilege
The skill is not always-enabled and makes no requests to modify other skills or system settings. Autonomous invocation is allowed by default (platform standard) but not combined with other privileged requests.
Assessment
This skill is coherent with its stated purpose, but you should think twice before installing or using it: it is explicitly designed to evade AI-detection tools and its aggressive 'Bypass' mode can encourage inventing concrete details or changing perspective (first-person), which may introduce false or misleading content and enable academic dishonesty or other misuse. If you proceed, consider limiting use cases (e.g., forbid use for submissions or assessments), require users to select the rewrite mode explicitly, and always verify facts and citations in rewritten output. If you need safer behavior, ask the developer to add guardrails: refuse requests that would impersonate people, add a ‘do not fabricate’ constraint, and log or block attempts to use the skill for academic cheating or fraudulent purposes.Like a lobster shell, security has layers — review code before you run it.
latestvk97byhq6r76xkmjd879wrvwn6184t2pp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
