Polygon

v1.0.0

Assist with Polygon PoS and zkEVM transactions, bridging, gas tokens, and ecosystem navigation.

2· 901·6 current·6 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill's name and description match the SKILL.md content: it is a how-to / reference guide for Polygon PoS and zkEVM topics (bridging, gas, wallets, staking). It does not request unrelated credentials, binaries, or permissions.
Instruction Scope
The SKILL.md contains only explanatory guidance and safety tips. It does not instruct the agent to read local files, access environment variables, call external endpoints on behalf of the user, or exfiltrate data. There is no open-ended 'gather whatever context you need' language that would broaden scope.
Install Mechanism
No install spec or code files are present. Being instruction-only, it requires no downloads or filesystem changes, which minimizes installation risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. This is proportionate for a read-only guidance/reference skill.
Persistence & Privilege
The skill is not always-enabled and has default invocation settings. It does not request persistent system-level privileges or modify other skills' configurations.
Assessment
This skill is a readable reference about Polygon networks and appears safe to install because it asks for nothing and makes no system changes. Treat its content as guidance only — it will not perform transactions. Before sending funds or bridging, independently verify chain IDs, RPC endpoints, and official bridge URLs (e.g., check polygonscan.com or official Polygon docs); the advice may become outdated. If you later install or use a different skill that performs transactions for you, only provide the minimal credentials required and prefer well-known providers or wallet integrations rather than giving private keys directly.

Like a lobster shell, security has layers — review code before you run it.

latestvk972f15q47ed2te5c82p1gkxs980wx3c

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🟣 Clawdis
OSLinux · macOS · Windows

Comments