Literature
v1.0.0Guide literary reading from personal response to scholarly analysis.
⭐ 2· 1.2k·1 current·1 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (guiding literary reading) match the SKILL.md content: conversational/teaching heuristics for beginners, students, researchers, and teachers. The skill does not request unrelated binaries, credentials, or configuration.
Instruction Scope
SKILL.md contains guidance about how the agent should adapt tone, ask questions, require textual evidence, and handle different audiences. It does not instruct the agent to read system files, access environment variables, call external endpoints, or exfiltrate data; scope stays within conversational pedagogy and analysis.
Install Mechanism
No install specification or code files are present; this is instruction-only, so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The instructions do not reference any hidden or additional secrets; requested access is proportional (none).
Persistence & Privilege
always is false and the skill is user-invocable with autonomous invocation allowed (the platform default). The skill does not request persistent privileges or attempt to modify other skills or system-wide settings.
Assessment
This is a low-risk, instruction-only skill that tells the agent how to guide readers at different levels; it asks for no credentials and installs nothing. If you install it, be aware that it's a set of conversational rules — it will rely on the agent to follow them, not on external tools. If you plan to have the agent analyze copyrighted or sensitive texts, avoid pasting text you don't want processed externally. If you want the agent to access your private editions or files, you'll need to provide that content explicitly (the skill itself does not request file or network access). Overall this is coherent and proportionate to its stated purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk978tn8xgv8zmqhnydbx8eq25d80x3ge
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📚 Clawdis
OSLinux · macOS · Windows
