Tibetan Translation
v1.0.0Expert translation methodology and best practices for English-Tibetan bilingual translation. Use when translating any content between English and Tibetan (Cl...
⭐ 1· 118·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the provided SKILL.md content. There are no unexpected binaries, credentials, or config paths requested; all requested capabilities are appropriate for a translation guidance skill.
Instruction Scope
SKILL.md contains detailed methodology, register guidance, script/Unicode notes, and QA practices. It does not instruct the agent to read unrelated files, access external endpoints, or collect credentials. The instructions stay within translation and quality-assurance scope.
Install Mechanism
No install spec and no code files; instruction-only distribution minimizes disk-write and remote-code risk.
Credentials
No environment variables, credentials, or config paths are required. The lack of requested secrets is proportional to the skill's translation purpose.
Persistence & Privilege
always is false and the skill does not request elevated or persistent system presence. Autonomous invocation by the agent is permitted by platform defaults but is not unusually privileged for this skill.
Assessment
This skill is coherent and appears safe in the sense that it only contains translation methodology. Before relying on it for important or sensitive religious, legal, or historical translations, have a qualified human Tibetan translator review outputs (especially for Classical texts, liturgy, or doctrinal passages). Expect the skill to provide style/register guidance and QA checklists, but not to replace native-speaker verification. If you need the agent to operate on private files, confirm how you will provide text (copy/paste vs. file upload) and avoid sending highly sensitive material without human review.Like a lobster shell, security has layers — review code before you run it.
latestvk9717qkqmfky9bpe75pzh7r4vd833ny7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
