Nutrition

v1.0.0

Build a personal nutrition system for tracking meals, calories, macros, vitamins, and minerals.

4· 1.7k·6 current·6 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (personal nutrition tracking) align with the instructions: estimating portions, calculating macros, flagging micronutrients, and writing logs in ~/nutrition/. No unrelated binaries, env vars, or services are requested.
Instruction Scope
Instructions are limited to creating and managing files under ~/nutrition/ and calculating nutrition totals from user-provided meal descriptions. This is in-scope for the stated purpose, but it does instruct the agent to create and write personal health data to disk (the workspace).
Install Mechanism
No install spec or code files — instruction-only skill. Nothing will be downloaded or written beyond the files the agent is explicitly told to create in ~/nutrition/.
Credentials
The skill requires no environment variables, credentials, or external config. Requested access is proportional to a local nutrition tracker.
Persistence & Privilege
The skill is not set to always:true and requests no special platform privileges. It will, however, persist user data to ~/nutrition/ which is a lasting change on disk; consider file permissions and backups. The skill can be invoked autonomously by the agent (default), which is normal but means it could write logs without explicit per-use consent if the agent autonomously acts.
Assessment
This skill is coherent with its description and only writes files under ~/nutrition/, so it doesn't request external credentials or install code. Before installing, consider: 1) You will have personal health data stored on your machine — choose whether you want those files and set restrictive file permissions (e.g., chmod 700 ~/nutrition). 2) Back up or encrypt the folder if you want extra privacy. 3) Confirm whether you want the agent to run autonomously (it can, by default) so it doesn't log or modify files unexpectedly. 4) Periodically review the created files and delete the folder if you stop using the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk970dpr01c66vskhewe12grwqx80zhc7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🥗 Clawdis
OSLinux · macOS · Windows

Comments