Zhang Data Compliance
v1.0.0九章-数据合规专家 - 数据安全、个人信息保护、跨境传输、算法合规、隐私政策
⭐ 0· 23·0 current·0 all-time
by张律师@sealawyer2026
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description describe a data-compliance/legal advisor. The skill requests no binaries, env vars, or config paths and includes only an explanatory SKILL.md and an empty case-library — all of which are proportionate to an advice-only skill.
Instruction Scope
SKILL.md contains only metadata, scope of services, a brief usage example, and references case-library.json (which is empty). It does not instruct the agent to read files, access environment variables, contact external endpoints, or perform unrelated system actions.
Install Mechanism
No install spec and no code files; instruction-only reduces disk/write risk. Nothing is downloaded or executed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths — appropriate for a documentation/advice skill.
Persistence & Privilege
always is false and there is no indication the skill requests persistent system-level privileges or modifies other skills. The default ability for the agent to invoke the skill autonomously remains, which is expected behavior.
Assessment
This skill is an instruction-only data-compliance advisor and appears internally consistent. Before using it, consider: (1) the publisher/source is unknown — verify the author's credentials if you will rely on legal advice; (2) the skill contains no case data (case-library.json is empty) and makes no network calls itself, so it won't exfiltrate data, but any responses you provide to the skill (questions, documents) could contain sensitive information — avoid sending secrets or client-confidential data; (3) do not treat automated advice as a substitute for formal legal counsel when high-stakes compliance decisions are involved. If you need stronger provenance guarantees, ask the publisher for a homepage, contact, or verifiable affiliation.Like a lobster shell, security has layers — review code before you run it.
latestvk970f0pn6jwytbz9y4ez6s2crn84agws
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
