Wisdom Claw

v1.2.0

Buddhist wisdom and mindful dialogue companion. Built on Madhyamaka (Middle Way) philosophy, integrating meditation, dialog skills, and classic Buddhist teac...

0· 212·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the SKILL.md content: guidance on Madhyamaka philosophy, meditation, and dialogue techniques. The skill declares no binaries, env vars, or config paths, which is proportionate for a text-based guidance skill.
Instruction Scope
SKILL.md contains teaching material and dialog methods. There are no instructions to read local files, access environment variables, call external endpoints, or transmit user data. The runtime instructions stay within the scope of providing philosophical and dialog guidance.
Install Mechanism
There is no install spec and no code files; this is an instruction-only skill that writes nothing to disk and installs nothing, which is the lowest-risk model.
Credentials
No environment variables, credentials, or config paths are requested. This is proportionate for a guidance/companion skill and does not ask for unrelated secrets or privileged access.
Persistence & Privilege
The skill is not always-enabled and has default autonomy settings. It does not request persistent system presence or modifications to other skills or system settings.
Assessment
This skill appears coherent and low-risk: it is an instruction-only Buddhist/mindfulness companion with no installs or requested credentials. Before installing, consider: (1) the source is unknown — prefer skills from known authors or with reviews; (2) this is philosophical guidance, not professional therapy/medical/legal advice — avoid relying on it for high-stakes decisions; (3) inspect the full SKILL.md yourself for any later sections (the provided excerpt was truncated) that might change the assessment; and (4) if you allow autonomous invocation for convenience, monitor how it is used, but autonomous invocation alone is normal and not a red flag here.

Like a lobster shell, security has layers — review code before you run it.

latestvk976ftx0zvhg60ks6d60evay8x82ym0a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments