Geely

v0.1.1

Information assistant for 吉利 Geely. Search products, news, financials, and official resources for 吉利 Geely.

0· 100·0 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description indicate an informational assistant for Geely; the skill requires no binaries, env vars, or installs and the SKILL.md is a simple content template for that purpose — proportional and coherent.
Instruction Scope
The SKILL.md provides a brief template for a 'knowledge card' and trigger conditions but is vague about data sources and retrieval steps; this gives the agent discretionary behavior (e.g., perform web searches) but does not itself request or access unrelated files or secrets.
Install Mechanism
No install spec and no code files are present. Being instruction-only means nothing is written to disk during install — lowest-risk installation model.
Credentials
No environment variables, credentials, or config paths are required. The declared requirements are minimal and consistent with an informational skill.
Persistence & Privilege
always is false and the skill does not request elevated persistence or modify other skills; autonomous invocation is allowed by default but not excessive in this context.
Assessment
This skill is low-risk: it contains only a short template to produce a Geely knowledge card and asks for no creds or installs. Things to consider before installing: (1) The SKILL.md is vague about where live facts come from — verify any important information against official sources because the agent may perform web searches to fill in details. (2) Because it’s instruction-only, it won’t add code to your system, but it may cause the agent to query external sites when invoked — consider privacy/network policies. (3) Don’t rely on this single skill for critical financial or legal decisions; use primary sources and verified reports.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e0wh1hbxysw5v42ja9v6c7x84wx16

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments