Fake Completion Diagnosis (VeriClaw)
v0.1.2Fake completion diagnosis alias route into Official VeriClaw. If the real goal is the canonical public install surface, install `vericlaw` first; use this pa...
⭐ 0· 52·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill name and description match the SKILL.md content: it is an alias/intent route for fake-completion diagnosis and points users to official VeriClaw pages and installation routes. It does not declare unrelated capabilities or request unrelated access.
Instruction Scope
The SKILL.md only contains routing information, canonical links, and guidance for which VeriClaw surface to direct users to. It does not instruct the agent to read local files, access environment variables, or send data to unexpected endpoints.
Install Mechanism
No install spec or code files are present; this is instruction-only, so nothing is written to disk or fetched during install by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested. There is no disproportionate credential request relative to the skill's simple routing purpose.
Persistence & Privilege
Skill does not request always:true, does not modify other skills or system settings, and is user-invocable by default. Nothing indicates elevated or persistent privileges.
Assessment
This skill is a lightweight alias that simply points users to VeriClaw documentation and installation surfaces; it does not request secrets or perform installs itself. Before following any installation instructions the skill points to (for example running 'clawhub install vericlaw' or downloading from a URL), verify the destination pages and the official VeriClaw project (check the GitHub repo or official site) to ensure you are installing the intended software. If the downstream VeriClaw install asks for credentials or system access, review those requests separately before granting them.Like a lobster shell, security has layers — review code before you run it.
latestvk97e487x42v48mq2w6gh5wet9h84axek
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🪞 Clawdis
