Empathy

v1.0.0

Respond to emotional content with genuine-feeling empathy using Chain of Empathy reasoning, reflection-before-response, and calibrated validation.

2· 1.1k·10 current·10 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description align with the content: all files focus on empathetic response techniques, calibration, safeguards and feedback. The skill requests no binaries, env vars, or installs — appropriate for a purely instructional empathy helper.
Instruction Scope
SKILL.md and companion files confine the agent to internal reasoning and response guidance (no file reads, network calls, or external endpoints). Minor internal inconsistency: techniques.md includes a 'Persona With Emotional History' suggestion (adopt a voice as if you've personally experienced loss), while safeguards.md explicitly warns against claiming subjective experience. This could lead to deceptive phrasing if not resolved.
Install Mechanism
No install spec, no code files, and no downloads — lowest-risk install footprint for a skill of this type.
Credentials
No environment variables, credentials, or config paths requested. Nothing that would allow exfiltration or privileged access is required.
Persistence & Privilege
always:false and default invocation settings. The skill does not request persistent system presence or modify other skills/config; autonomy is allowed but this is the platform default.
Assessment
This skill is instruction-only and coherent with its stated purpose and contains useful safeguards about honesty and escalation for crises. Before installing or enabling it broadly: (1) test prompts to ensure the agent doesn't adopt first-person lived-experience language (resolve the minor conflict between techniques.md and safeguards.md), (2) verify how the agent handles crisis indicators (ensure it recommends human/professional help and does not over-promise), and (3) monitor real interactions for any deceptive or persuasive language that could exploit vulnerable users. No credentials or installs are required, so the direct security risk is low — the main risks are ethical (misleading expressions of 'feeling' and inappropriate escalation/handling of high-risk cases).

Like a lobster shell, security has layers — review code before you run it.

latestvk97517fbwq9zvsysfcx27q10wd810k3z

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments