Adaptive Tool Filter
v1.0.0智能识别用户意图,动态筛选并优先排序相关工具,降低token消耗提升响应效率。
⭐ 0· 348·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (adaptive tool filtering to reduce tokens and prioritize tools) matches the SKILL.md content and example logic. Required resources (none) align with an instruction-only design.
Instruction Scope
Instructions stay within filtering/intent-detection scope. They recommend preserving previously used tools and special handling for sensitive tools (e.g., require explicit permission for 'exec', check files for 'edit'). This is reasonable, but the 'preserve previous tools' rule can unintentionally keep dangerous tools enabled across turns if not strictly controlled.
Install Mechanism
No install spec and no code files — nothing is written to disk or downloaded. This is the lowest-risk installation model and matches the skill's intent.
Credentials
The skill declares no environment variables, no credentials, and no config paths. There is nothing disproportionate requested for the stated purpose.
Persistence & Privilege
The skill is not always:true and does not request persistent system changes. However it explicitly recommends retaining previously used tools and references agent-management tools (sessions_spawn/subagents). Those capabilities are powerful if enabled in the platform — ensure they remain subject to user consent and policy controls.
Scan Findings in Context
[no_code_detected] expected: The regex-based scanner found no code files or suspicious patterns. This is expected because the skill is instruction-only (SKILL.md) and contains only example snippets and prompts.
Assessment
This skill is coherent and low-risk as-is because it only contains guidance and no installs or credentials. Before enabling it: review which tools your agent exposes and ensure sensitive tools (exec, process, sessions_spawn, any file-write or remote-posting tools) require explicit, per-action confirmation; avoid automatic persistence of previously used dangerous tools across turns; test the filter in a sandboxed agent with a limited toolset to verify it doesn't unintentionally allow escalation or automated spawning of subagents.Like a lobster shell, security has layers — review code before you run it.
latestvk9793jbm95g20bwx2jhexxr2qx83wddsoptimizationvk9793jbm95g20bwx2jhexxr2qx83wddsperformancevk9793jbm95g20bwx2jhexxr2qx83wddstoken-savingvk9793jbm95g20bwx2jhexxr2qx83wddstoolsvk9793jbm95g20bwx2jhexxr2qx83wdds
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
