Overcome Problem
v1.0.0Break down any problem with structured thinking, action plans, and progress tracking
⭐ 6· 2.6k·9 current·9 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (break down problems, action plans, progress tracking) match the SKILL.md content. There are no unrelated required binaries, environment variables, or config paths; nothing requested is disproportionate to a problem‑solving guide.
Instruction Scope
SKILL.md contains only procedural guidance for decomposition, planning, and tracking and does not instruct the agent to read files, call external services, or access credentials. It does include the statement 'All data stays local on your machine,' which is a user guidance claim — but since this is only instructional text (no code enforcing locality), it cannot technically guarantee where data is processed or logged by the platform or model provider. Do not paste secrets into prompts if you require strong privacy guarantees.
Install Mechanism
No install spec and no code files — lowest risk. Nothing will be written to disk by the skill itself.
Credentials
The skill does not request any environment variables, credentials, or config paths; requested privileges are proportional (none).
Persistence & Privilege
always:false and user-invocable:true (defaults). The skill does not request persistent presence or modify other skills; it does not require autonomous privileges beyond normal platform behavior.
Assessment
This skill is a benign, instruction‑only problem‑solving framework that asks for nothing sensitive and installs nothing. However, the SKILL.md's privacy statement is only guidance — interactions with the skill are processed by your agent/model infrastructure and could be logged by the service provider. If you need guaranteed local-only processing, avoid pasting secrets or sensitive data into prompts and verify your platform's privacy guarantees before use.Like a lobster shell, security has layers — review code before you run it.
latestvk9796pp2z403t8pkv1m0dbz3617zw5zp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
