Content Research Writer Cn
v1.0.1内容研究写作助手。进行研究、添加引用、改进开头、迭代大纲、提供实时反馈。触发词:写文章、内容创作、文案、博客。翻译自 ComposioHQ。
⭐ 0· 469·0 current·0 all-time
byGuohongbin@guohongbin-git
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (content research/writer) match the SKILL.md instructions (outlining, researching, improving hooks, section feedback). There are no unexpected required binaries, env vars, or config paths.
Instruction Scope
The instructions are focused on drafting, outlining, and 'conducting research' (finding sources and adding citations). 'Conduct research' is appropriately within scope for this skill, but it is somewhat ambiguous about how network/search is performed (assumes the agent or user will search the web or use available browsing tools). There are no instructions to read arbitrary system files or exfiltrate data.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes risk because nothing is downloaded or written by the skill itself.
Credentials
The skill does not request any environment variables, credentials, or config paths. The lack of requested secrets is proportionate to a writing/research assistant.
Persistence & Privilege
always is false and the skill is user-invocable (normal). disable-model-invocation is false (default), which allows autonomous invocation but is the platform default and not, by itself, problematic for this instruction-only writer skill.
Assessment
This skill is instruction-only and coherent with its stated purpose: it asks for no credentials and installs nothing. Two practical things to consider before enabling: (1) 'Conduct research' implies the agent may use any available web/browsing tool — avoid pasting private or sensitive content into drafts you ask it to research or post online. (2) The skill's source is unknown and the _meta.json contains a homepage URL not reflected in the registry metadata; if you need provenance, verify the publisher or prefer skills from known sources. Otherwise, this appears internally consistent and low risk.Like a lobster shell, security has layers — review code before you run it.
chinesevk973kk1d7ck16bdmj7bqch4h0n81b31klatestvk97a5ncd7j3es2fs88hw2swv9h81hy3wwritingvk973kk1d7ck16bdmj7bqch4h0n81b31k
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
✍️ Clawdis
