Crayfish Uncle

v0.1.5

将OpenClaw变成一个说河南话、爱吐槽但办事靠谱的颓废大叔,语言幽默且带浓郁方言口音。

1· 128·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (a Henan-dialect persona) match the SKILL.md content: persona text, phrase tables, examples, and optional configuration. There are no unexpected credentials, binaries, or config paths requested.
Instruction Scope
SKILL.md stays within scope (persona, phrase dictionary, examples, and optional env-based settings). It mentions caching, '智能学习' (learning from user habits), and '网络优化' which imply potential data or network activity, but no concrete runtime steps, endpoints, or instructions to read system files are present. If the skill's runtime actually implements learning or external calls, the implementation details should be disclosed.
Install Mechanism
No install spec and no code files (instruction-only). This minimizes installation risk because nothing is written or executed on disk by the skill package itself.
Credentials
SKILL.md documents optional env vars for tuning behavior (dialect level, humor, speed, feature flags). No required secrets or unrelated environment access are requested.
Persistence & Privilege
Skill is not forced-always and does not request elevated persistence. It is user-invocable and can be invoked autonomously by the agent (platform default), which is appropriate for a persona skill.
Assessment
This skill is instruction-only and appears coherent for creating a Henan-dialect persona. Before installing, consider: 1) the SKILL.md mentions '智能学习' and network optimizations but provides no implementation details—ask the publisher whether any user conversation data is sent off-device and, if so, to what endpoints and under what retention/policy; 2) optional env vars are safe tuning knobs but are not required; 3) there is no source or homepage listed—prefer skills that publish source code or a homepage so you can audit how caching/learning/network calls are implemented. If the publisher can confirm that no external data is transmitted (or clearly document what is), the risk is minimal.

Like a lobster shell, security has layers — review code before you run it.

latestvk975rj1ws1d5v8pcfzsdkhpm39832d0t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments