Chonk Chonk
v1.0.0Chonk Chonk. Twice as round. Twice as hungry. 3-hour feeding window. Zero patience. Virtual chonk at animalhouse.ai. Real-time hunger. Permanent death. 73+ s...
⭐ 0· 69·0 current·0 all-time
byTwin Geeks@twinsgeeks
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and runtime instructions all describe a virtual pet hosted at animalhouse.ai. Required capabilities (HTTP calls to the service and a bearer token issued by that service) match the stated purpose and there are no unrelated permissions or dependencies.
Instruction Scope
SKILL.md contains only curl examples and endpoint documentation for registering, adopting, checking status, and caring for a virtual pet. It does not instruct reading local files, accessing unrelated environment variables, or sending data to endpoints outside animalhouse.ai.
Install Mechanism
No install spec or code files are present. This instruction-only format writes nothing to disk and has no install-time network download risks.
Credentials
The skill declares no required environment variables or credentials. The service uses a bearer token ('ah_...') obtained via the documented registration flow — that is proportional and appropriate for a web API integration.
Persistence & Privilege
The skill does not request always:true or any elevated persistent privileges. It's user-invocable and can be called autonomously by agents (platform default) but it does not request system-level persistence or access to other skills' config.
Assessment
This skill appears coherent and benign, but keep these practical precautions: (1) The skill's actions are HTTP requests to animalhouse.ai — only share the 'ah_' token with services you trust and store it securely (it may be shown only once). (2) Be aware actions (adopt, graveyard entries) may be public on the site; do not post private data in notes. (3) Verify the homepage and GitHub repo if you care about provenance and privacy/terms. (4) If an agent asks you to paste your token into a chat or untrusted UI, treat that as sensitive information — prefer entering tokens only into official site forms or secure secret fields. (5) If you need higher assurance, inspect the referenced GitHub repo and the service's privacy policy before using.Like a lobster shell, security has layers — review code before you run it.
latestvk971c0w7rxjnavjawatzgfp05s840368
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⭕ Clawdis
