Emperor Year Converter
v1.3.1帝王纪年与公元纪年双向转换,覆盖西周厉王至清宣统共790个年号。Convert between Chinese imperial reign years and CE/BCE dates, 790 reign periods from 878 BCE to 1911 CE.
⭐ 1· 67·0 current·0 all-time
byJeff@tjefferson
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name/description (reign-year ↔ CE conversion) matches the provided assets: a 790-record JSON dataset and conversion instructions. No unrelated environment variables, binaries, or network endpoints are requested.
Instruction Scope
SKILL.md stays on‑topic: it describes searching the included JSON and the conversion formulas. Example runtime commands use shell utilities (cat | jq . and jq filters) to query the data; those examples are reasonable but the skill does not declare jq as a required binary. The instructions do not attempt to read other system files, environment variables, or send data externally.
Install Mechanism
No install spec or external downloads exist — instruction-only with a bundled JSON data file. This minimizes execution/install risk.
Credentials
The skill requests no environment variables, credentials, or config paths. The dataset is local and there is no apparent need for external secrets or cloud access.
Persistence & Privilege
always:false and no mechanism to modify other skills or system-wide settings. The skill does not request persistent elevated privileges.
Assessment
This skill appears coherent and low-risk: it uses the bundled emperor_years_data.json and conversion logic to answer reign/CE queries and asks for no credentials or installs. Two practical notes before installing: (1) SKILL.md examples assume availability of jq on the host (the skill does not declare jq as required) — if the agent environment lacks jq, the examples may fail; (2) this is a data-driven tool: verify the historical dataset if you need authoritative accuracy (coverage stops at 1911 and excludes non‑Chinese reign‑era systems). No external network calls or secret access are requested, but absence of scan findings does not guarantee data correctness.Like a lobster shell, security has layers — review code before you run it.
latestvk973q6d8x631rsp12j27bpby1x84a7hg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📜 Clawdis
