Gatekeeper Navigator
v1.0.0Navigate any gatekeeper situation — choose bypass vs befriend, apply the right technique, and draft scripts that pass the anti-manipulation check. Trigger th...
⭐ 0· 21·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md instructions: the skill provides techniques and scripts for getting past or befriending gatekeepers. It requires no binaries, credentials, or installs and depends only on another prospecting skill, which is proportionate to its stated purpose.
Instruction Scope
Instructions stay within the access-layer remit (diagnose situation, pick technique, draft scripts, run an anti-pattern audit, write gatekeeper-navigator-output.md). The skill explicitly warns against manipulative/pretending patterns. It does describe techniques to 'extract a DM name' and 'bypass' which are social-engineering tactics — these are coherent with the sales purpose but may raise ethical/privacy concerns if used to deceive.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is downloaded or written during install, so there is no install-time risk.
Credentials
The skill requests no environment variables, credentials, or config paths. Runtime tools are Read/Write for producing documents, which aligns with the declared 'write gatekeeper-navigator-output.md' task.
Persistence & Privilege
always:false and no special privileges requested. The skill does not request permanent presence or system-wide config changes. Autonomous model invocation is allowed by default but is not excessive here.
Assessment
This skill is internally coherent for sales prospecting and doesn't request system credentials or install anything. Before installing, consider policy and ethical limits: the guidance includes techniques to 'bypass' gatekeepers and extract names — avoid using the skill to impersonate, deceive, or violate privacy rules and company policies. If you are concerned about the agent acting autonomously with this skill, keep autonomous invocation disabled or review outputs, and ensure the agent does not get access to CRMs or other sensitive data that could be combined with the techniques to harvest PII. If you want a deeper assurance, ask for the full SKILL.md (untruncated) to confirm there are no instructions to access external endpoints, system files, or credentials.Like a lobster shell, security has layers — review code before you run it.
bookforgevk97cq6n703tpfswsp8jgnekdd9851rkxlatestvk97cq6n703tpfswsp8jgnekdd9851rkxtags:vk97cq6n703tpfswsp8jgnekdd9851rkx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📚 Clawdis
