Axiom Distributed Science

v1.1.0

Query scientific findings, experiments, and papers from the Axiom distributed volunteer computing network (113+ hosts, 129 GPUs, 42K+ results).

0· 218·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description describe a read/query interface to the Axiom distributed science network; the skill only requires curl and documents public HTTP endpoints — this is proportionate and expected.
Instruction Scope
SKILL.md instructs the agent to perform HTTP GETs and an optional POST to the documented Axiom API endpoints. It does not direct the agent to read local files, access unrelated environment variables, or execute fetched experiment scripts. The only potential privacy implication is that user-provided suggestion text will be sent to an external service when using the POST endpoint.
Install Mechanism
No install spec or code is provided (instruction-only), so nothing gets written to disk or downloaded by an installer. Required binary is only curl, which matches the documented usage.
Credentials
The skill requests no environment variables, credentials, or configuration paths — consistent with a public-read API client and a simple suggestion POST endpoint.
Persistence & Privilege
always is false and the skill is user-invocable only; it does not request persistent system presence or elevated privileges.
Assessment
This appears internally consistent and safe to inspect, but keep these practical cautions in mind: (1) When asking the agent to submit a suggestion, any text you provide will be posted to an external site — avoid including sensitive or identifying information. (2) The API exposes URLs to experiment scripts; do not automatically execute downloaded scripts—treat them as untrusted code. (3) Verify the homepage (https://axiom.heliex.net) yourself if you need assurance about the project's legitimacy. (4) If you plan to have the agent fetch large amounts of data or fetch and run code, restrict it to read-only review only and avoid execution. If you want a deeper check, provide the homepage content or more metadata so I can verify origin and content authenticity.

Like a lobster shell, security has layers — review code before you run it.

latestvk97700ne3cjddwbgx58hk8kxx182jmfk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔬 Clawdis
Binscurl

Comments