Grant Funding Scout
v0.1.0NIH funding trend analysis to identify high-priority research areas
⭐ 0· 97·0 current·0 all-time
byAIpoch@aipoch-ai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and provided code align: a local/demo funding trend analyzer using embedded mock data. Required binaries/env/configs are none, which is proportionate for the stated demonstration purpose.
Instruction Scope
SKILL.md describes a demo using mock data and notes production integration would require external APIs; runtime instructions and the Python script operate locally and do not call external services. The SKILL.md's risk table mentions 'Read input files' but the shipped script only writes an output file when --output is supplied and does not read arbitrary input files — minor mismatch between docs and code.
Install Mechanism
No install spec is provided (instruction-only + one script). No downloads or external packages are required; lowest-risk install posture.
Credentials
No environment variables, secrets, or credentials are required by the skill. That matches the demo nature and is proportionate.
Persistence & Privilege
Skill is not forced-always, does not request persistent privileges, and does not modify other skills or system-wide settings. It runs as a standalone script when invoked.
Assessment
This is a demo tool using embedded mock data and appears coherent and low-risk for local use. Before using it in production: (1) review and implement safe integration with real APIs (NIH RePORTER, NSF) and only supply necessary API keys; (2) confirm any output file path is intended (the script will write JSON when --output is used); (3) if you modify the script to fetch remote data, perform a security review for network calls and credential handling; (4) run the script in a sandbox or isolated environment if you are unsure about changes. The only minor inconsistency is the SKILL.md mentioning reading input files while the current code does not — verify intended input behavior if you expect file inputs.Like a lobster shell, security has layers — review code before you run it.
latestvk9716nsyxcn71y0rr34wwbx72x83fw74
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
