Recruiter

v1.0.0

Source candidates, screen resumes, and manage hiring pipelines with effective recruiting practices.

3· 1.1k·2 current·2 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (sourcing, screening, pipeline management) match the SKILL.md content. The skill requests no binaries, env vars, or config paths that would be unrelated to recruiting.
Instruction Scope
SKILL.md contains only procedural guidance and best practices (sourcing, screening, interviews, legal notes). It does not instruct the agent to read local files, access environment variables, run commands, or send data to external endpoints.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or downloaded during install.
Credentials
The skill declares no required credentials or environment variables. There are no disproportionate secrets or unrelated service tokens requested.
Persistence & Privilege
always is false and the skill does not request elevated persistence. It is user-invocable and can be invoked autonomously (platform default), which is expected for an advisory skill.
Assessment
This skill is a content-only recruiting playbook and is coherent with its stated purpose. It does not request credentials or install code, so from a permissions/footprint perspective it is low-risk. Consider these practical points before enabling: (1) The guidance is general — consult legal counsel for jurisdiction-specific hiring and background-check rules. (2) Be careful how you feed real candidate data to the agent: ensure applicant PII is handled according to your privacy policy and laws (e.g., GDPR). (3) If you allow autonomous invocation, monitor actions that send messages or emails on behalf of your organization and require explicit approval before the agent contacts candidates or external services.

Like a lobster shell, security has layers — review code before you run it.

latestvk978qdpeh5y8qha5g5p9z3c78n80xn4d

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🎯 Clawdis
OSLinux · macOS · Windows

Comments