How Elon Musk Thinking About This
v1.0.0Answer any question using Elon Musk's thinking frameworks. Trigger this skill when the user says things like "think like Elon," "how would Musk see this," "E...
⭐ 0· 91·0 current·0 all-time
byStar@star23
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (apply Elon Musk thinking frameworks) align with the SKILL.md content and the two reference docs; there are no unexpected binaries, environment variables, or external services requested.
Instruction Scope
SKILL.md limits the agent to applying public-source frameworks (and explicitly avoids impersonation). It does not instruct the agent to read local files, access unrelated environment variables, or transmit data to external endpoints.
Install Mechanism
No install spec and no code files — instruction-only — so nothing will be written to disk or downloaded during install.
Credentials
The skill requires no credentials, env vars, or config paths, which is proportionate for a purely instructional/formatting skill.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or modify other skills. Autonomous invocation is allowed by default but that is normal and not in itself excessive here.
Assessment
This is an instruction-only skill that teaches the agent to apply public Elon Musk–derived frameworks when asked; it does not install software or request credentials. Things to consider before installing: (1) outputs reflect heuristics distilled from public sources and may oversimplify or be opinionated—verify factual claims independently; (2) the skill explicitly says not to impersonate Elon, but double-check responses for wording that could be mistaken for personality imitation if that matters legally or ethically; (3) autonomous invocation is allowed by default (normal for skills)—if you prefer to control when it runs, adjust agent settings; (4) because it can influence recommendations (e.g., advocating high-risk approaches), keep a human-in-the-loop for consequential decisions. No technical incoherence or covert behavior was found.Like a lobster shell, security has layers — review code before you run it.
latestvk97b19h2275km5bm8r5d0gc6cs83qnrx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
