Li Bin Perspective V2

v1.0.0

提供基于李斌核心心智模型的创业决策与战略规划视角,聚焦用户价值、长期主义和全价值链控制。

0· 48·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (李斌视角用于创业决策与战略规划) matches the contents of SKILL.md and the two supporting docs. There are no unrelated environment variables, binaries, or config paths requested that would be inconsistent with delivering a thought-perspective persona.
Instruction Scope
SKILL.md only instructs the agent how to adopt a perspective, what heuristics to apply, activation phrases, and output style. It does not direct the agent to read arbitrary system files, access environment variables, call external endpoints, or exfiltrate data. The only file references are the included CLASSIC_WORKS.md and CONNECTIONS.md, which are packaged with the skill.
Install Mechanism
No install specification or external downloads are present (instruction-only skill). This minimizes disk writes and execution of third-party code.
Credentials
The skill requires no credentials or environment variables. The requested scope is minimal and proportional to a persona/strategy skill.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes. Autonomous invocation is allowed by platform default but not combined with any elevated privileges or broad credential access.
Assessment
This skill is internally consistent and low-risk: it only contains an instruction persona and two local reference files and asks for no credentials or installs. Before using, remember: (1) outputs are a simulated perspective distilled from public sources—not the real person's statements—so verify factual claims independently; (2) avoid presenting the responses as direct quotes or endorsements from the real individual; (3) treat its strategic recommendations as advisory, not authoritative financial/legal advice; and (4) if you later extend the skill (add code or external API calls), re-evaluate for credential or network risks.

Like a lobster shell, security has layers — review code before you run it.

latestvk977st07nq6dshjggs6akt3eb984azm2

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments