Tech Debate

v1.0.0

针对技术话题,模拟正方与反方两派进行多阶段、多轮结构化辩论,阶段之间用户可干预(支持某方/补充论点/提出新视角),最终由 Judge 提炼全局共识、分歧与实践建议。当用户说【对XXX进行技术辩论】、【debate: XXX】、【正反两方讨论XXX】、【辩论一下XXX】、【tech debate】时触发。支持用户设...

0· 75·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (technical multi-stage debate) match the provided SKILL.md and prompt templates; no unrelated binaries, env vars, or config paths are requested.
Instruction Scope
SKILL.md and prompt templates confine behavior to generating debate roles, rounds, judge summaries, and pausing for user input; there are no instructions to read files, call external endpoints, exfiltrate data, or access system credentials.
Install Mechanism
No install spec and no code files (instruction-only). Nothing is written to disk or downloaded during install—lowest-risk model for skills.
Credentials
No environment variables, secrets, or credentials are required. The declared requirements are minimal and proportionate to the stated functionality.
Persistence & Privilege
always:false (default) and autonomous invocation is allowed by platform defaults but not escalated by the skill; the skill does not request persistent system-wide changes or modify other skills' configurations.
Assessment
This skill is instruction-only and internally consistent: it performs no network calls, does not request secrets, and only generates structured debate content. Before using, consider: (1) test it on non-sensitive or hypothetical topics to validate Judge neutrality and output quality; (2) be aware that the debate content is generated text—verify any factual/technical claims independently; (3) confirm the skill respects the promised pause-for-user-intervention behavior in practice (so it won't run longer than you expect). No credentials or installs are required, so the main risks are incorrect or biased conclusions rather than data-exfiltration or system compromise.

Like a lobster shell, security has layers — review code before you run it.

latestvk9798yp1c294r77f12h8cy3zsx83q0ez

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments