STRING PPI Query

v1.0.0

Query STRING database for protein-protein interactions with confidence scores. Use this skill when: (1) Finding interaction partners for a protein of interes...

0· 24·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description align with the files and example: the skill is for querying STRING for protein–protein interactions and confidence scores. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
SKILL.md and the example only show calling a runtime tool (TOOLS['ppi_string_request']) with UniProt IDs and parameters, parsing returned scores, and formatting output. The instructions do not ask the agent to read arbitrary files, environment variables, or send data to endpoints outside the STRING API. Note: the example adjusts sys.path to import the local tool registry (typical for packaged examples) and assumes a platform-provided ppi_string_request tool that will perform network calls to STRING.
Install Mechanism
No install spec is provided (instruction-only with an example script). No downloads or archive extraction are present.
Credentials
The skill declares no required environment variables or credentials. That is proportionate for public STRING queries which do not require user secrets in typical usage.
Persistence & Privilege
always is false and the skill does not request elevated or persistent system privileges. Normal autonomous invocation is allowed by platform defaults.
Assessment
This skill appears coherent and low-risk: it simply queries the public STRING API for protein interaction data and formats results. Before installing, ensure your agent runtime provides a trusted implementation of TOOLS['ppi_string_request'] (the example assumes such a tool) and be aware that queries will result in network calls to string-db.org (so avoid sending any sensitive or private identifiers). Also observe STRING API rate limits when running batch queries.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ey9m1ex2nbcm2ae6qvb3nsd84f8w7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments