Story
v2.0.0Draft, edit, and schedule creative stories with content optimization. Use when drafting chapters, editing narratives, optimizing readability, scheduling posts.
⭐ 0· 167·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (story drafting, editing, scheduling) match the included shell implementation and README: all operations are local, file-based, and related to content management.
Instruction Scope
SKILL.md directs use of the local 'story' CLI and documents local data storage. The included script operates only on files under the data directory and does not instruct the agent to read unrelated system files or send data externally.
Install Mechanism
No install spec is provided (instruction-only). A shell script is included in the repo; there are no downloads or archive extraction instructions, and nothing is fetched from external URLs during runtime.
Credentials
The skill requests no environment variables or credentials. The script uses HOME to place data in ~/.local/share/story only—this is proportional to the stated purpose.
Persistence & Privilege
The skill does not request always:true, does not alter other skills or system-wide config, and only creates/updates files in its own data directory. Agent autonomy settings are default.
Assessment
This skill appears to be a simple offline CLI that logs story entries under ~/.local/share/story and does not transmit data or require credentials. Before installing: (1) review the script file yourself (scripts/script.sh) and run it locally in a non-root account; (2) be aware that any text you save becomes plaintext logs in ~/.local/share/story (avoid storing secrets); (3) when installing, place the script in a directory on your PATH and set appropriate file permissions (chmod 755), and consider backing up or rotating the data directory if you need privacy. If you want stronger guarantees, run the script in a restricted environment (container or dedicated user) and verify no additional network calls occur when you run it.Like a lobster shell, security has layers — review code before you run it.
latestvk97ej1jq6pjv23nwsk050baqsn834cpm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
