Interview Architect
v1.0.0Design and manage structured evidence-based interviews, including scorecards, question banks, rubrics, panel coordination, evaluation, and offer decision sup...
⭐ 0· 1.1k·1 current·1 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (interview design, scorecards, rubrics, question banks) match the content of SKILL.md and README: templates, checklists, and processes. No credentials, binaries, or unrelated dependencies are requested, which is proportionate for this purpose.
Instruction Scope
SKILL.md contains templates, prompts, rubrics, and procedural guidance for running interviews and audits. It does not instruct the agent to read system files, access external endpoints, or exfiltrate data; actions are limited to generating content and process guidance.
Install Mechanism
There is no install spec and no code files—this is instruction-only. That minimizes risk since nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The absence of requested secrets is appropriate for a templates-and-guidance skill.
Persistence & Privilege
always is false and the skill is user-invocable (normal defaults). It does not request permanent system presence or modify other skills' configurations.
Assessment
This skill appears coherent and low-risk: it only provides templates and interview process guidance and requests no installs or credentials. Before using it in production, however, review the generated templates for legal and privacy compliance (especially how you collect, store, and share candidate PII), avoid pasting real candidate resumes or sensitive data into the agent if you don't want that data retained, and treat automated scoring as advisory—have humans validate decisions. Also note README links to third-party context packs and pages; do not follow or provide credentials to external vendors without vetting them. Finally, test the skill with non-sensitive example data to confirm output meets your policies and local hiring regulations.Like a lobster shell, security has layers — review code before you run it.
hiringvk97a59q3vy2fbat044zb92han981ebhzhrvk97a59q3vy2fbat044zb92han981ebhzinterviewvk97a59q3vy2fbat044zb92han981ebhzlatestvk97a59q3vy2fbat044zb92han981ebhzrecruitmentvk97a59q3vy2fbat044zb92han981ebhz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
