Argument Audit
v1.0.0论点审计 - An analytical tool that evaluates the logical structure, evidence quality, and persuasiveness of arguments. Use when user asks about 论点分析、论证评估、逻辑审查、观点...
⭐ 0· 95·0 current·0 all-time
byhaidong@harrylabsj
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description align with the included handler.py and SKILL.md. The skill performs local analysis of argument text (structure, evidence, fallacies) and does not request unrelated capabilities, binaries, or credentials.
Instruction Scope
SKILL.md instructs the agent to analyze user-provided text only; handler.py implements local text analysis and fallacy detection and does not call external services, read files, or access environment variables. Note: the detection heuristics include hard-coded keyword lists (some offensive terms used only to detect ad hominem) and simple pattern rules that can produce false positives/negatives.
Install Mechanism
No install spec provided (instruction-only skill). There are no download/extract/install steps or third-party package pulls in the metadata.
Credentials
The skill declares no required environment variables, no credentials, and no config paths — which is appropriate for a purely local text-analysis utility.
Persistence & Privilege
No elevated persistence requested (always:false). The skill does not request system-wide changes or modification of other skills' configs.
Assessment
This skill appears internally consistent and works only on text you provide. Before installing, consider: (1) it cannot verify external facts or fetch sources — do not rely on it to validate claims against the web; (2) its fallacy detection uses brittle heuristics and may produce false positives or flag text that contains offensive words (those words are only in its detection lists); (3) the handler.py shown is local and contains no network/file I/O, but a full review of the complete file is recommended if you require higher assurance (the provided snippet ends with a truncated marker — obtain the full source if concerned). Avoid submitting sensitive secrets or private data to any third‑party skill even if the code appears local.Like a lobster shell, security has layers — review code before you run it.
latestvk975nwtgc6cskbdx8n4cnyy2vh83vzwe
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
