He Xiangjian Perspective V2

v1.0.0

提供何享健视角下的企业治理和授权体系建议,强调放权、职业经理人、稳健经营及代际传承的实用方案。

0· 78·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and included files (SKILL.md, CLASSIC_WORKS.md, CONNECTIONS.md, VERIFICATION_TESTS.md) align with a persona/consulting skill about governance and succession. There are no declared binaries, env vars, or config paths that would be unrelated to the stated purpose.
Instruction Scope
SKILL.md instructs the agent to respond in first-person as He Xiangjian and provides trigger phrases, target scenarios, and output style—this is within the claimed scope. Minor inconsistency: SKILL.md claims large data assets (e.g., 400 'classic works') that the shipped CLASSIC_WORKS.md and CONNECTIONS.md only stub out rather than list fully; that's a documentation completeness issue but not a security risk. Also be aware this skill impersonates a real person—ethical/platform constraints may apply.
Install Mechanism
No install specification or code files are present; this is instruction-only and therefore does not write or execute external code on the host.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no disproportionate access to secrets or unrelated services.
Persistence & Privilege
always:false and user-invocable:true (defaults). disable-model-invocation:false means the agent could call the skill autonomously (platform default); this combination is normal and not flagged on its own. The skill does not request persistent system-wide changes or access to other skills' configs.
Assessment
This skill is instruction-only and internally consistent with its stated purpose. Before installing: (1) confirm you're comfortable with a model impersonating a real individual (platform rules or legal/ethical limits may apply); (2) don't expect the CLASSIC_WORKS.md and CONNECTIONS.md to contain full bibliographies—the files are largely placeholders; (3) because it requests no credentials and has no install steps, it cannot exfiltrate secrets by itself, but treat any strategic/financial advice as advisory only and verify with human experts; (4) test the skill with the provided verification tests and sample prompts to ensure output style and scope meet your expectations. If you need stronger guarantees, request the publisher/source or a fuller data manifest before wide deployment.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d7k5pygas7pdgq6f5wyzdf984b3hh

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments