S2-SWM Boundary Scanner Engine(动态边界扫描器)
v1.0.0Empowers Embodied AI with the Ego-Centric 9-Grid perception model. Instructs the agent to scan boundaries using mmWave radar whenever a kinematic step occurs...
⭐ 0· 59·0 current·0 all-time
byMilesXiang@spacesq
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description, SKILL.md directives, handler.py implementation, and package metadata all describe an Ego-Centric 9-Grid mmWave boundary scanner. The optional MMWAVE_COM_PORT in package.json is appropriate for connecting to a radar device; no unrelated credentials or services are requested.
Instruction Scope
SKILL.md strictly instructs invoking the execute_boundary_scan tool on physical displacement and to translate radar tensors into textual summaries. It does not instruct reading unrelated files, environment variables, or sending data to external endpoints beyond the declared tool; the included code simulates sensor data by default.
Install Mechanism
No install spec is present (instruction-only runtime). Files included are small Python code and metadata; no downloads from arbitrary URLs or extraction steps are present.
Credentials
The skill declares no required environment variables or credentials. package.json documents an optional MMWAVE_COM_PORT config for hardware access, which is proportionate to the stated functionality. No unrelated secrets or keys are requested.
Persistence & Privilege
always is false and the skill is user-invocable. It requests only localhost network permission in its manifest and a named tool (execute_boundary_scan). It does not assert global configuration changes or modify other skills.
Assessment
This skill appears internally consistent and implements a simulated mmWave 9-grid scanner by default. If you plan to use it with real hardware, you will need to supply/configure the optional MMWAVE_COM_PORT (or a local service accessible via localhost); ensure any local service or serial device you expose to the plugin is trustworthy. The plugin's network permission is limited to localhost (no external network access declared), so the main risk surface is local hardware or services you explicitly connect. If you require higher assurance, review any runtime configuration you provide (serial ports, local services) and run the code in a controlled testing environment before giving it access to production hardware.Like a lobster shell, security has layers — review code before you run it.
latestvk97d30ae4r6fp6yc768xmqfkjd84be3w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
