Ma Huateng Perspective
v1.0.2基于马化腾思维框架,提供商业产品决策、边界判断、生态赋能及快速迭代的分析与建议。
⭐ 0· 84·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and included reference material all match the stated goal of distilling Ma Huateng's thinking for product/strategy advice. The skill requests no binaries, env vars, or config paths, which is proportionate for an instruction-only advisor skill.
Instruction Scope
SKILL.md contains only guidance for adopting a particular viewpoint, decision heuristics, trigger phrases, example responses, and internal validation; it does not instruct the agent to read files, access environment variables, call external endpoints, or exfiltrate data. Note: the skill simulates a real living person's perspective — this is an ethical/accuracy concern (possible misattribution or synthesis errors) rather than a technical incoherence; users should be aware outputs are a distilled interpretation and verify factual claims.
Install Mechanism
No install spec and no code files executed at runtime (instruction-only). This minimizes risk from downloads/executables. The static scanner had no code to analyze.
Credentials
No environment variables, credentials, or config paths are required. The skill does not request access to unrelated services or secrets — proportional to its declared function.
Persistence & Privilege
Flags are default: always:false, user-invocable:true, model invocation allowed. The skill does not request permanent presence or to modify other skills or system settings.
Assessment
This skill appears coherent and low-risk to install: it is instruction-only, requires no credentials, and its files support the claimed purpose. Before installing, consider: (1) Accuracy & attribution — the skill synthesizes a living person's perspective; verify any factual or legal claims before acting. (2) Sensitive data — avoid submitting confidential business or personal secrets to any persona-style skill, since outputs are generated text and may be used in logs. (3) Ethical/disclosure — if you use responses externally, consider labeling them as an interpretation/analysis rather than direct quotes from the individual. (4) Review references — the package includes source/reference files; scan them for quality if you need higher assurance. If you plan to let an agent invoke skills autonomously, remember that autonomous invocation is the platform default; this skill does not request elevated persistence or extra privileges. If you want lower risk, run it only when explicitly user-invoked and test with non-sensitive scenarios first.Like a lobster shell, security has layers — review code before you run it.
latestvk97drybazm1xyjgv19j24qk1bd84aahp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
