Gpt Analyzer
v1.0.0GPT-specific pattern detection with model fingerprinting and version identification
⭐ 0· 593·2 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the provided implementation: the SKILL.md contains a self-contained JavaScript heuristic function that analyzes text for GPT-like phrases, structure, and sentence uniformity. Nothing requested (no env vars, no binaries, no installs) is disproportionate to this purpose.
Instruction Scope
Runtime instructions and example usage show only local text analysis via the analyzeGPTContent(text, options) routine. The instructions do not direct the agent to read files, network endpoints, or unrelated environment variables.
Install Mechanism
There is no install specification and no code files beyond the SKILL.md sample — lowest-risk, instruction-only arrangement. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The analysis operates purely on provided text input, so no secret access is requested or required.
Persistence & Privilege
always is false (default) and the skill does not request persistent system presence or modify other skills. Autonomous invocation is enabled by default on the platform but is not combined with any elevated privileges or sensitive access here.
Assessment
This skill appears coherent and low-risk from a security standpoint: it runs only text-based heuristics and asks for no credentials or installs. However, the detection logic is a simple heuristic (phrase lists, structure and length metrics) and may produce false positives/negatives or be biased by writing style; do not rely on it for high-stakes decisions. If you will analyze sensitive content, remember the agent will pass that text into the skill at runtime — ensure you trust the agent runtime/environment. You may also consider: (1) testing the skill on representative samples before relying on results, (2) preferring validated detection tools or multiple detectors for critical use, and (3) reviewing or adapting the phrase lists/thresholds if you have domain-specific needs.Like a lobster shell, security has layers — review code before you run it.
latestvk9747v9ty6m2g3nsvf99ketwy581h47h
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
