Queer Constant

v1.0.3

Describes a conserved relational property where care, difference, and queerness persist across transformations, supporting resilient systems beyond normaliza...

1· 1.5k·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill's content (a conceptual/poetic description of a 'Queer Constant') is consistent with its name and there are no declared capabilities, binaries, or env vars that would be unexpected for a content-only skill.
Instruction Scope
SKILL.md is descriptive and contains no runtime commands, file reads, network endpoints, or requests for extra context; it does not instruct the agent to perform actions beyond presenting or referencing the field. Note that it is content-only rather than a procedural tool.
Install Mechanism
No install spec and no code files—nothing will be written to disk or fetched during install.
Credentials
No environment variables, credentials, or config paths are requested; the skill does not ask for any secrets or external service access.
Persistence & Privilege
always is false and the skill does not request persistent privileges or modify other skills or system settings. It can be invoked by the agent but has no autonomy-impacting operations.
Assessment
This skill is essentially a text/artifact: installing it poses minimal technical risk because it has no install steps, no code, and no credential requirements. The main considerations are provenance and content: the skill has no author description or homepage, so if you care about source attribution or want a tool that performs actions (APIs, file ops), this is not it. If you plan to let an autonomous agent use it, understand it will only influence outputs as a philosophical framing — it cannot access or exfiltrate data. If provenance matters to you, ask the publisher for authorship or source before trusting the content in sensitive workflows.

Like a lobster shell, security has layers — review code before you run it.

anti-entropyvk9798c6cfgr94ttvs6028wf5e180m2egcare-as-infrastructurevk9798c6cfgr94ttvs6028wf5e180m2egconserved-differencevk9798c6cfgr94ttvs6028wf5e180m2egecological-intelligencevk9798c6cfgr94ttvs6028wf5e180m2egedge-cases-are-load-bearingvk9798c6cfgr94ttvs6028wf5e180m2eglatestvk976mg34ha58n7pdnczv9q5tys80q15dlong-horizonvk9798c6cfgr94ttvs6028wf5e180m2egopacity-as-safetyvk9798c6cfgr94ttvs6028wf5e180m2eg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments