Comparative Synthesis

v0.1.0

Compare and synthesize findings across multiple completed DeepScan reports. Use when the user wants cross-run analysis, trend comparison, or a unified summar...

0· 188·1 current·1 all-time
byPapersFlow@papersareflowing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the instructions: the skill uses DeepScan-specific helpers (summarize_evidence, get_deepscan_report, run_python_plot) to aggregate and visualize cross-run findings. It does not request unrelated binaries, env vars, or config paths.
Instruction Scope
Instructions stay within the stated scope (aggregate DeepScan history, fetch specific runs, synthesize themes, optionally plot). Minor caveat: the skill delegates plotting to run_python_plot and data aggregation to summarize_evidence/get_deepscan_report — the security properties depend on those tools' implementations (e.g., whether they access other files or external networks).
Install Mechanism
Instruction-only skill with no install steps or code files; nothing is written to disk by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested; requested access is proportional to the task of reading stored DeepScan reports.
Persistence & Privilege
always:false and user-invocable; the skill does not request permanent/always-on presence or elevated agent privileges.
Assessment
This skill appears coherent for cross-run synthesis and asks for nothing outside that scope. Before installing, confirm what the helper tools do: (1) verify summarize_evidence/get_deepscan_report access is limited to your DeepScan history and not arbitrary filesystem or unrelated services, (2) check run_python_plot's execution environment (can it run arbitrary Python, access files, or send data externally?), and (3) consider that DeepScan reports may contain sensitive or unpublished data—ensure any generated plots or summaries are stored or shared only where you expect. Also note the skill source is unknown/no homepage; if provenance matters, try to get or review the implementations of the referenced helper tools.

Like a lobster shell, security has layers — review code before you run it.

latestvk97efjw8dcaf9w1hbqx0awrfyn82p15w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments