humanize-zh-writers
v0.1.0作家风格写作助手。模仿王小波、王朔、马尔克斯、卡尔维诺、博尔赫斯的写作风格对文本进行改写或创作。触发词:王小波风格、王朔风格、马尔克斯风格、卡尔维诺风格、博尔赫斯风格、用王小波写、用王朔写、用马尔克斯写、用卡尔维诺写、用博尔赫斯写、痞子风格、魔幻现实、元叙事、迷宫叙事、按某某作家风格写。
⭐ 0· 118·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Chinese writer-style rewriting) align with the SKILL.md content. The instructions explain how to emulate each author's mechanisms and do not ask for unrelated capabilities or secrets.
Instruction Scope
All runtime instructions are limited to how the agent should rewrite or generate text in particular stylistic modes. The SKILL.md does not direct the agent to read files, access environment variables, call external endpoints, or transmit data outside the normal agent workflow.
Install Mechanism
No install spec or code files are present; this is instruction-only, so nothing is written to disk and no external packages are pulled in.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate request for secrets or unrelated service tokens.
Persistence & Privilege
always is false and default autonomous invocation is allowed (normal). The skill does not request persistent system presence or modification of other skills/configuration.
Assessment
This skill appears internally consistent and low-risk from a technical/permission standpoint because it is instruction-only and asks for no credentials or installs. Before installing, consider non-technical concerns: (1) style imitation of named authors—especially living authors—may raise copyright or ethical issues on some platforms; avoid producing text that reproduces copyrighted passages verbatim and prefer transformation that is clearly original; (2) test outputs to ensure they do not accidentally mirror identifiable copyrighted sentences; (3) if you plan to enable this skill for autonomous use, be aware it can generate content without further permission—consider policy or moderation rules you want to enforce. If you want a deeper check, provide any associated install code or examples of generated output so I can look for accidental verbatim reproduction or other red flags.Like a lobster shell, security has layers — review code before you run it.
latestvk97f41a5mskq677sc2kzj1xqgd83azr3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
