CORE Prism (CORE 四维战略透镜)

v1.0.2

CORE four-dimensional strategic lens for deep analysis of news, business theories, and strategic decisions. Use when (1) analyzing news/reports/business theo...

0· 126·0 current·0 all-time
byKeDouPi(珂抖屁)@kedoupi
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (CORE four-dimensional strategic lens) matches the SKILL.md content. All declared capabilities (reading USER.md for the [E] Execution dimension) are justified by the stated purpose. No unrelated binaries, env vars, or credentials are requested.
Instruction Scope
The runtime instructions stay within the stated analysis purpose: accept text/URLs from the user, apply the CORE framework, and read USER.md to tailor execution recommendations. The skill does not instruct the agent to read other system files, search the filesystem, call external endpoints, or exfiltrate data. The SKILL.md explicitly lists USER.md as the only read permission and uses it only for personalization.
Install Mechanism
There is no install spec and no code files — this is instruction-only. That minimizes disk writes and supply-chain risk.
Credentials
No environment variables, API keys, or credentials are requested. Reading USER.md is proportionate to the declared personalization feature; no other secrets or config paths are required.
Persistence & Privilege
Skill does not request always:true and is user-invocable only. Autonomous model invocation is allowed (platform default) but not combined with other concerning permissions or credentials.
Assessment
This skill appears coherent and lightweight, but before installing: (1) Inspect the contents of your USER.md — do not store secrets, API keys, or highly sensitive material there because the skill will read it to personalize recommendations. (2) Be mindful when feeding proprietary documents or private URLs as input — the skill will analyze whatever you provide, so avoid pasting secrets or private logs. (3) If you pair this skill with other skills that fetch external content (e.g., an automated news fetcher), consider the combined behavior and whether those fetchers transmit data externally. Otherwise this instruction-only skill is low-risk and behaves as described.

Like a lobster shell, security has layers — review code before you run it.

COREvk97cwc1jekde0kxq9httfsp7vx83kj9wanalysisvk97cwc1jekde0kxq9httfsp7vx83kj9wdecision-makingvk97cwc1jekde0kxq9httfsp7vx83kj9wfirst-principlesvk97cwc1jekde0kxq9httfsp7vx83kj9wframeworkvk97cwc1jekde0kxq9httfsp7vx83kj9wlatestvk97byhm8r4hv7ee6ezf6pm9yzs83prvwstrategyvk97cwc1jekde0kxq9httfsp7vx83kj9w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments