Iacuc Protocol Drafter
v0.1.0Draft IACUC protocol applications with focus on the 3Rs principles justification
⭐ 0· 65·0 current·0 all-time
byAIpoch@aipoch-ai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (IACUC protocol drafting) align with the provided SKILL.md and the Python script: the code reads protocol data and generates application text focused on 3Rs. There are no unrelated requirements (no cloud creds, no extra binaries).
Instruction Scope
SKILL.md instructs local use (read JSON input, write output) and the script follows that scope. Note: the security checklist in SKILL.md recommends input path validation and prompt-injection protections, but the visible portion of the script shows direct file open/JSON load without explicit path sanitization or sandboxing. This is expected for a CLI tool but means users should be careful about input/output paths and running it with untrusted inputs.
Install Mechanism
No install spec; this is an instruction-only skill with a local Python script relying only on the standard library. No remote downloads or package installs are required.
Credentials
The skill requests no environment variables, no credentials, and no config paths. That is proportional to the described functionality.
Persistence & Privilege
always is false and model invocation defaults are unchanged. The skill does not request elevated or persistent system privileges and does not modify other skills or global agent settings.
Assessment
This skill appears coherent and local-only, but before installing or running it: 1) inspect the complete scripts/main.py file (the listing provided was truncated) to confirm there are no hidden network calls, exec/eval usage, or file-system operations you don't expect; 2) run it in a sandbox or non-privileged account first; 3) avoid passing sensitive or system file paths as the input parameter (the script reads whatever JSON path you supply and could overwrite an output path); 4) validate and sanitize input JSON if it comes from untrusted sources; 5) confirm generated content conforms to your institution's IACUC policies before use. If you want higher assurance, ask the publisher for the full untruncated source and a short security review showing there are no external network calls or subprocess invocations.Like a lobster shell, security has layers — review code before you run it.
latestvk97agbrey31hjdyxvsvnjse8v983ft8y
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
