Cao De Wang Perspective V2
v1.0.0提供基于曹德旺专注实业、成本领先、质量信仰与慈善责任等核心心智模型的创业和制造业决策视角。
⭐ 0· 71·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (曹德旺视角) align with the included SKILL.md, CLASSIC_WORKS.md, CONNECTIONS.md, and verification tests. The skill does not request unrelated binaries, env vars, or config paths; required capabilities are proportional to the stated purpose.
Instruction Scope
SKILL.md instructs the agent to adopt a first-person Cao De Wang style and lists triggers, use cases, and expected output format. It does not instruct reading system files, calling external endpoints, or collecting secrets. Note: the skill explicitly directs the agent to speak in the voice of a real public figure, which is a content/impersonation consideration (not a technical incoherence) — verify that impersonation is acceptable for your use.
Install Mechanism
No install spec and no code files that would be written to disk. Instruction-only skills present minimal install risk.
Credentials
The skill requires no environment variables, credentials, or config paths. There are no disproportionate requests for secrets or unrelated service access.
Persistence & Privilege
always is false and the skill is user-invocable; model invocation is allowed (the platform default). The skill does not request persistent system privileges or claim to modify other skills' configs.
Assessment
This skill is instruction-only and internally consistent with its stated goal of providing a Cao De Wang–style decision perspective. It does not ask for credentials or install code, so the technical risk is low. Before relying on its output: (1) Remember it's a persona-based assistant and can confidently state opinions or facts that should be verified — do not use it as the sole basis for legal, financial, or regulatory decisions. (2) Check whether using a first‑person voice that mimics a named public figure fits your policy or legal constraints (impersonation or misattribution risk). (3) Run the provided verification tests and try representative prompts to see if the tone and recommendations match your expectations. (4) If you plan to integrate this into automated workflows, monitor outputs and add human review for high‑impact decisions.Like a lobster shell, security has layers — review code before you run it.
latestvk9758hcw1b08219yfvj4p96djn84awxw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
