Norman Mailer Skill
v2.0.2提供若曼·梅尔的存在主义新闻学和权力本体论视角,助你深入现实、识别权力结构,启发深度写作与行动决策。
⭐ 0· 46·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (Norman Mailer perspective on journalism, power, and writing) matches the SKILL.md content. No unexpected binaries, env vars, or config paths are requested.
Instruction Scope
SKILL.md is purely authorial: models, heuristics, examples, and practical prompts for writing and political action. It does not instruct the agent to read local files, access external secrets, or transmit data to third-party endpoints. Note: the text encourages embodied/real-world action (e.g., 'walk into the scene', 'bring your body to the political theater'), which is coherent with the skill's purpose but could prompt users toward risky real-world activism; this is a content caution rather than an implementation/technical coherence problem.
Install Mechanism
No install spec and no code files. Instruction-only skills have minimal disk/system footprint; nothing is downloaded or executed by default.
Credentials
The skill declares no environment variables, credentials, or config paths. There is no disproportionate request for secrets or unrelated credentials.
Persistence & Privilege
Flags are default (always: false, user-invocable true, model invocation allowed). The skill does not request elevated persistence or system-wide config changes.
Assessment
This skill is a content-only, perspective/heuristics module about Norman Mailer and related strategic thinking. It does not request credentials or install software, so technical risk is low. Before using: (1) be aware the material is opinionated and includes provocative/violent metaphors and politically charged positions — review for suitability and bias before applying its advice to real-world actions; (2) the skill advocates embodied political action in places; if you follow that advice, consider legal and safety implications in your jurisdiction; (3) verify any factual or historical claims against primary sources if you need accuracy; (4) because it’s instruction-only, no code is executed, but the agent may generate persuasive text — review outputs for harmful or actionable guidance before acting on them.Like a lobster shell, security has layers — review code before you run it.
ai expert mindsetvk971hpgfg36002x5aeehq79r8s84q9mrlatestvk971hpgfg36002x5aeehq79r8s84q9mr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
