Plan First

v1.0.0

Solve complex multi-step tasks by generating a detailed plan before execution. Based on the Plan-and-Solve prompting research, this skill breaks tasks into c...

0· 36·0 current·0 all-time
bySimon@simoncatbot
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the SKILL.md: the skill teaches a plan-then-execute workflow and provides templates and examples. It declares no binaries, env vars, or installs, which is appropriate for a purely prompting/instructional skill.
Instruction Scope
The runtime instructions are planning-focused and do not tell the agent to read system files, exfiltrate data, or call external endpoints. Examples reference real-world actions (DB migrations, sending email, running CLI tools) — which is expected — but are inherently open-ended: if the agent later executes a plan it generates, that execution could require credentials or run commands. The skill itself does not include execution commands or hidden I/O instructions.
Install Mechanism
No install spec and no code files. Lowest-risk class: nothing is written to disk or downloaded by the skill.
Credentials
No environment variables, credentials, or config paths are requested. Example plans mention services (SMTP, databases, cloud tools) but the skill does not request unrelated secrets or persistent credentials.
Persistence & Privilege
always is false and the skill does not request elevated or persistent privileges. disable-model-invocation is false (the platform default) but this is not combined with other risky indicators here.
Assessment
This skill is coherent and low-risk as-distributed: it's a prompt/template for planning complex tasks and does not by itself access your system or secrets. Before using it in an agent that will execute steps autonomously, review any generated plan carefully and do not supply credentials unless you intend the agent to perform actions that require them. If you want to limit risk, keep this skill user-invocable only (avoid allowing fully autonomous runs), and require human approval before executing any plan steps that perform network calls, modify databases, or run shell commands.

Like a lobster shell, security has layers — review code before you run it.

latestvk975ca28tj7devs8gnj4jty0xd842nv4methodologyvk975ca28tj7devs8gnj4jty0xd842nv4planningvk975ca28tj7devs8gnj4jty0xd842nv4problem-solvingvk975ca28tj7devs8gnj4jty0xd842nv4workflowvk975ca28tj7devs8gnj4jty0xd842nv4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments