Feynman Perspective V2

v1.0.0

理查德·费曼思维视角 v2.0 · 诺贝尔物理学奖得主 核心心智模型:费曼学习法、简化能力、深度游戏、货物崇拜检测、演示>论证、反自欺、好奇心驱动、命名≠理解、不确定性拥抱、教学检验 用途:学习成长、知识传授、创新思维、科学思考 触发词:「用费曼的视角」「费曼会怎么看」「费曼学习法」「简化」「反自欺」

0· 108·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (Feynman thinking perspective) matches the provided SKILL.md and supporting documents: the skill defines mental models, heuristics, and a response style. It does not request unrelated binaries, cloud access, or credentials. Source/homepage are absent (informational gap) but not a security mismatch.
Instruction Scope
Runtime instructions are limited to adopting a persona/style (simplify, teach at a 6th-grade level, use analogies, admit uncertainty). They do not instruct reading system files, accessing env vars, calling external endpoints, or exfiltrating data. The skill references bundled docs (CLASSIC_WORKS.md, CONNECTIONS.md, VERIFICATION_TESTS.md), which are included.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be downloaded or written to disk by an installer, so install risks are minimal.
Credentials
requires.env / primary credential / config paths: none. The skill does not ask for any secrets or system access, which is proportional to its stated purpose.
Persistence & Privilege
always: false and default autonomous invocation allowed (normal). The skill does not request permanent system-wide presence or modify other skills' configurations.
Assessment
This skill is internally coherent and low-risk from a security perspective because it is instruction-only and requests no credentials or installs. Before installing: understand that the author/source is unknown (no homepage) so treat outputs as an interpretive persona rather than authoritative statements attributed to Richard Feynman; verify factual claims independently, especially for technical or safety-critical advice. Also note some lists in the bundled docs are placeholders (e.g., '400 classics' expanded with elisions), so review those files if you expect comprehensive bibliographies or tests. If you later see the skill requesting network access, credentials, or other elevated permissions, revoke it and re-evaluate.

Like a lobster shell, security has layers — review code before you run it.

latestvk974c2733w4kbd7wbbakb2w6an84b182

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments