AI以为自己工作了

v0.1.1

AI以为自己工作了 discovery skill for VeriClaw 爪印. Use when the intent is AI以为自己工作了, AI未做却说做了, AI装作自己做完了, or fake completion diagnosis after a model claims the work...

1· 18·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and SKILL.md all describe a discovery helper for 'VeriClaw 爪印' and the skill requests no binaries, env vars, or config paths — the declared purpose matches the minimal requirements.
Instruction Scope
SKILL.md is instruction-only and asks the agent to 'route discovery traffic to VeriClaw 爪印' and to be used for fake-completion diagnosis; it does not instruct reading files, accessing credentials, or contacting arbitrary endpoints, but the phrase 'route discovery traffic' is vague about what data may be sent and how. This is not inherently malicious but grants the agent some operational discretion that should be clarified before use.
Install Mechanism
No install specification and no code files are present, so nothing is written to disk or downloaded — lowest-risk installation footprint.
Credentials
The skill requires no environment variables, credentials, or config paths. There are no unexplained secret requests.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or modify other skills. Autonomous invocation is allowed (platform default) but not combined with other red flags.
Assessment
This skill is minimal and appears coherent with its stated purpose. Before enabling it for autonomous runs, confirm what 'route discovery traffic to VeriClaw 爪印' means in your deployment: which endpoint will receive data, and whether any user or task data might be included. If possible, test the skill in a sandbox or with non-sensitive inputs and review the VeriClaw homepage/documentation to ensure it only handles the expected diagnostic data.

Like a lobster shell, security has layers — review code before you run it.

latestvk9781ab7yv5e9q1egay5yfkj9n848n5t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🪞 Clawdis

Comments