佩奇 Skill

v2.0.2

提供拉里·佩奇的创新思维模型和决策启发,助力打造颠覆性AI产品和战略级技术布局。

0· 57·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description promise (Larry Page thinking models and decision heuristics) matches the SKILL.md content: a biography, ten mental models, heuristics, tone/style guidance and decision prompts. There are no unexpected requirements (no env vars, no binaries) that would be disproportionate.
Instruction Scope
SKILL.md contains only content to guide the agent's responses (persona, models, heuristics). It does not instruct the agent to read local files, access system config, call external endpoints, or exfiltrate data. No vague 'gather whatever context you need' instructions are present in the provided excerpt.
Install Mechanism
No install spec and no code files — instruction-only. This is the lowest-risk install profile; nothing will be written to disk or downloaded by an installer.
Credentials
The skill requires no environment variables, credentials, or config paths. Nothing in SKILL.md references secrets or unrelated services, so there is no credential overreach.
Persistence & Privilege
Skill is not set to always:true and it is user-invocable; autonomous invocation is allowed by platform default but is not combined with other risky properties (no credentials, no persistent installs). It does not request modification of other skills or system settings.
Assessment
This skill is an instruction-only persona that provides strategic frameworks and heuristics inspired by Larry Page; from a security perspective it is low-risk because it requests no credentials and does not install code. Before using, consider: (1) the content is opinionated and may include speculative/factual claims (verify any business-critical facts independently), (2) persona-style skills can produce persuasive but non-actionable recommendations—do not treat them as a substitute for legal/financial/operational advice, and (3) if you later add code or integrations to enable actions (deployments, cloud access, etc.), re-evaluate for credential scope and install sources.

Like a lobster shell, security has layers — review code before you run it.

ai expert mindsetvk97b1fmtvddmjwxdn76j7y3qa984n0zjlatestvk97b1fmtvddmjwxdn76j7y3qa984n0zj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments