Gate Audit

v1.0.0

Use this skill when the user provides AF2, ESMFold, AF3, Boltz-1, SASA, or MD results and needs a Gate 1-4 audit with a Go/Hold/Kill decision.

0· 108·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description ask for audits of AF2/ESMFold/AF3/SASA/MD outputs; the skill requests no extra binaries, env vars, or installs — that is proportionate for a guidance/checklist skill.
Instruction Scope
SKILL.md contains a focused list of audit checks, required outputs, and decision logic; it does not instruct the agent to read unrelated system files, fetch external resources, or exfiltrate credentials. The agent will only act on user-provided prediction/log/MD data.
Install Mechanism
No install spec and no code files are present (instruction-only), so nothing is written to disk and there is no third-party install risk.
Credentials
No environment variables, credentials, or config paths are requested — which is appropriate for a manual-audit guidance skill.
Persistence & Privilege
always is false and disable-model-invocation is default; the skill does not request permanent/global privileges or modify other skills, so persistence/privilege footprint is minimal.
Assessment
This skill is a checklist and will only be useful if you provide the actual AF/ESM/SASA/MD outputs, logs, and checkpoints it expects. It does not install code or request secrets. Before using: (1) ensure you supply complete logs, checkpoints, and baseline/negative-control data so the audit can follow its rules; (2) do not paste sensitive credentials into the inputs; (3) treat its output as an expert-guided summary — have a domain expert review Go/Hold/Kill decisions for critical actions; (4) if you plan to let an autonomous agent use this skill, confirm the agent has only the specific files you intend it to analyze (the skill itself won’t fetch remote data or run simulations).

Like a lobster shell, security has layers — review code before you run it.

latestvk976evhp4pgvbsjpfqcxkt4afx836kfv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments