Clausewitz Skill
v2.0.1提供基于克劳塞维茨战略理论的严谨战争与竞争分析,指导集中优势、管理摩擦及识别顶点,适用于军事与商业决策。
⭐ 0· 65·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Clausewitz strategic analysis for military/business) match the SKILL.md content: a long, self-contained set of models, heuristics, and example dialogues. The skill requests no binaries, credentials, or config paths, which is appropriate for a text-only advisory skill.
Instruction Scope
SKILL.md contains only guidance, heuristics, and example dialogues. It does not instruct the agent to read files, environment variables, system paths, or to transmit data to external endpoints. There is no scope creep in the instructions themselves.
Install Mechanism
No install spec and no code files — lowest-risk, instruction-only skill. Nothing is written to disk and no external archives or packages are pulled.
Credentials
The skill declares no environment variables, credentials, or config paths and the instructions do not reference any secrets — no disproportionate access requested.
Persistence & Privilege
always:false and default model invocation are appropriate for a user-invocable advisory skill. The skill does not request persistent system presence or to modify other skills/configuration.
Assessment
This skill is self-contained and coherent with its description: it provides high-level Clausewitz-derived strategy and business heuristics and does not request system access or secrets. Consider these points before installing: (1) provenance — the source/homepage is unknown; if you require trustworthiness or up-to-date sourcing, prefer skills from known publishers or request citations; (2) ethical/legal risk — the guidance includes military concepts that could be sensitive if applied to real-world conflict planning; do not use it to plan unlawful or dangerous actions; (3) nondeterministic advice — this is advisory material, not a substitute for legal, military, or professional expertise; validate critical decisions with qualified experts; (4) permissions — the skill needs no extra permissions, but avoid granting additional environment or network access unless you understand why it's required.Like a lobster shell, security has layers — review code before you run it.
ai expert mindset strategyvk973qjtwf02xjm5qpxrx0akq3s84kxvnlatestvk973qjtwf02xjm5qpxrx0akq3s84kxvn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
