Explain

v1.0.2

Learns how to explain things to your human. Adapts format, depth, and style by topic.

2· 737·4 current·4 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (adaptive explanation) match the content: guidance files and runtime SKILL.md all focus on formatting, depth, domains, and tracking preferences. No unrelated capabilities, binaries, or credentials are requested.
Instruction Scope
Runtime instructions are limited to observing user signals, adapting behavior, and optionally persisting confirmed preferences. They do not direct the agent to read other system files, network endpoints, or unrelated environment variables.
Install Mechanism
No install spec and no code files to execute; this is instruction-only, so nothing will be downloaded or installed on disk beyond the explicit memory file the skill asks to create.
Credentials
The skill declares no required env vars, credentials, or config paths. It does ask to create and maintain a single local file (~/explain/memory.md) which is proportional to the personalization purpose.
Persistence & Privilege
The skill persists preferences to ~/explain/memory.md and will create that file on first use. This is reasonable for a personalization skill, but it does create local state that may contain user-specific preferences. It is not set to always:true and does not request elevated privileges.
Assessment
This skill appears coherent and low-risk: it only contains guidance for adapting explanations and stores a local preference file at ~/explain/memory.md. Before installing, consider whether you are comfortable with the agent writing a small file to your home directory; you can inspect or delete that file at any time. If you have strict data controls, verify your platform's file-write policies for skills; otherwise this skill does not request credentials, network endpoints, or other sensitive access.

Like a lobster shell, security has layers — review code before you run it.

latestvk979kj3yc8apx8ea4qjchxj6h18163w7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments