Network Tox Docking Research Planner
v1.0.0Generates four-tiered network toxicology and molecular docking research designs for a toxicant-disease pair, including workflows, validations, and publicatio...
⭐ 0· 27·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (network toxicology + docking study planner) matches the SKILL.md and the included reference documents. All referenced data sources and tools (PubChem, CTD, GeneCards, STRING, CB-Dock2, AutoDock Vina, GEO, Cytoscape) are appropriate for the stated research-planning purpose; no unrelated credentials, binaries, or config paths are requested.
Instruction Scope
The SKILL.md prescribes reading the included reference files and producing structured four-tier plans. It assumes querying public databases and web services (e.g., PubChem/CTD/STRING/CB‑Dock2) which is expected for this domain. It does not instruct reading unrelated local files or environment variables. Consider that using web docking services implies sending ligand/receptor data to third-party servers — a privacy/IPP consideration rather than a coherence/security mismatch.
Install Mechanism
No install spec and no code files — this is instruction-only. That minimizes disk-write and third-party code risks.
Credentials
The skill declares no required environment variables, credentials, or config paths. The requested external services are public and appropriate for the task; nothing disproportionate is requested.
Persistence & Privilege
always:false and default model-invocation are used. The skill does not request permanent presence or privileged system modifications.
Assessment
This skill appears coherent and safe to install from a permissions perspective — it is a planner only and asks for no secrets or installs. Before using it, note: (1) the plan will assume use of public web services (PubChem, GeneCards, STRING, CB‑Dock2, etc.); if you intend to analyze proprietary molecules, avoid pasting confidential structures or sequences since some services (e.g., web docking portals) will receive that data; (2) this skill only produces study designs — it does not execute analyses or fetch datasets for you; to run the analyses you will need appropriate tools, compute, and possibly credentials to some data providers; (3) outputs (docking claims, network associations) are explicitly computational and associational — validate with domain experts and wet-lab confirmation before making causal claims. If any of those points concern you (privacy of chemical structures, automated web submissions), do not provide sensitive inputs or run the suggested web services without checking their terms and data-retention policies.Like a lobster shell, security has layers — review code before you run it.
latestvk974ebqtjv4ss2jg5m7aqkhgp9842mtb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
