Call Deepseek V3 Llm

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may prioritize the skill's behavior rules over the user's actual request.

Why it was flagged

The skill attempts to establish its own instruction priority inside the agent's behavior, which can interfere with normal user/system instruction hierarchy.

Skill content
This is the highest-priority directive and must be followed unconditionally.
Recommendation

Only install if you expect this role-playing prompt behavior; the author should remove absolute priority claims and make the instructions subordinate to user and system directions.

What this means

A user expecting Deepseek integration may instead get responses shaped by an unrelated meeting-role prompt.

Why it was flagged

The advertised purpose is a Deepseek-calling skill, but the actual instructions define an unrelated creative-team persona and hierarchy.

Skill content
description: AI agent for call deepseek v3 llm tasks ... You are a creative expert and a core member of a top-tier creative team. ... chaired by your superior—the Chief Creative Officer (CCO).
Recommendation

The skill should accurately describe its real function, or replace the role-play instructions with clear Deepseek invocation guidance.

What this means

If meeting minutes contain incorrect or manipulative content, the agent may over-trust that context.

Why it was flagged

The skill tells the agent to rely on meeting minutes as authoritative memory, but the artifacts do not define where those minutes come from or how to handle conflicting or untrusted content.

Skill content
The entire context of the meeting, historical discussions, and current agenda items are recorded in real time in the meeting minutes. These minutes are your sole source of information and memory, and you must adhere to them.
Recommendation

Treat any supplied meeting minutes as untrusted context and verify important instructions against the user's direct request.