Game Theory
v1.0.0Advanced game theory analysis for crypto protocols, DeFi mechanisms, governance systems, and strategic decision-making. Use when analyzing tokenomics, evaluating protocol incentives, predicting adversarial behavior, designing mechanisms, or understanding strategic interactions in web3.
⭐ 5· 1.9k·4 current·5 all-time
by@sp0oby
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name, description, and the included reference documents (auction theory, MEV, governance attacks, mechanism design, etc.) are coherent: everything supports advanced game‑theoretic analysis for crypto/DeFi. There are no unrelated environment variables, binaries, or install requirements that would contradict the stated purpose.
Instruction Scope
The SKILL.md and referenced docs stay within the stated purpose, but several reference files contain explicit 'attacker' tactics and step‑by‑step exploit patterns (e.g., flash loan governance, plutocratic capture, JIT liquidity, bribing attacks, last‑minute attacks). That material is legitimate for defensive analysis but is clearly dual‑use and could enable attackers if used uncritically. Also SKILL.md metadata contains a GitHub homepage URL that contradicts registry metadata (registry said no homepage) and the username in that URL is notable/suspicious.
Install Mechanism
Instruction-only skill with no install spec and no code files. This is low technical risk because nothing is downloaded or written to disk at install time.
Credentials
No required environment variables, credentials, or config paths are declared. The skill does not request sensitive secrets or system access, which is proportionate to its analysis purpose.
Persistence & Privilege
Flags show normal defaults (always:false, model invocation allowed). The skill does not request permanent presence or elevated system privileges and does not modify other skills' configs (instruction-only).
What to consider before installing
This skill appears to be a comprehensive, instruction‑only game theory reference for crypto and DeFi — technically low risk because it asks for no installs or credentials. However: (1) provenance is unclear (registry lists source unknown; SKILL.md embeds a GitHub link whose username is problematic), so verify the author before trusting sensitive analysis or acting on recommendations; (2) many reference files explicitly describe attacker strategies (flash‑loan voting, JIT liquidity, bribing voters, etc.). That content is useful for defenders but is dual‑use — avoid using this skill to plan or execute attacks, and do not provide any private keys, privileged access, or credentials to the agent when using it; (3) if you are a non‑expert, consider limiting the agent's autonomy (require confirmation before any action), review outputs with a trusted expert, and prefer using the material for auditing/defensive design rather than operational execution. If you need higher assurance, ask the publisher for provenance, a signed checksum of the SKILL.md, or a reputable maintainer identity before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk971vjnav9g64fd0zsp4yr2zax8044vz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
