Call Grok4 Llm

v0.1.1

AI agent for call grok4 llm tasks

0· 763·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (call grok4 llm agent) match the SKILL.md content: role-playing as a creative team member that reads meeting minutes and replies. There are no extraneous env vars, binaries, or install steps, so required artifacts are proportionate to the stated purpose.
Instruction Scope
Instructions are narrowly scoped to reading provided meeting minutes, staying task-focused, and matching output language to the user's initial challenge. One notable constraint forbids inferring response language from the system prompt or minutes — this is a strict internal rule that could conflict with higher-priority system instructions in some platforms and may cause unexpected behavior if not coordinated with system-level policies.
Install Mechanism
No install spec and no code files — the skill is instruction-only, which minimizes disk/code execution risk.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no apparent need for any external secrets, which is proportionate for a meeting-agent skill.
Persistence & Privilege
Default privileges (not always:true, agent-invokable, normal autonomous invocation enabled). The skill does not request persistent system presence or modify other skills/configuration.
Assessment
This skill is instruction-only and appears coherent for running a creative meeting assistant. Before installing: 1) confirm how the platform supplies the 'meeting minutes' so the agent has the intended context (and that those minutes don't contain sensitive secrets you wouldn't want reproduced), 2) be aware the skill enforces language rules that could conflict with system-level or higher-priority prompts — test interactions to ensure no unexpected behavior, and 3) because there is no code to inspect, rely on runtime testing to validate that the skill behaves as expected. Overall risk is low given no installs or credentials requested.

Like a lobster shell, security has layers — review code before you run it.

latestvk979vrzhzzzfaf1m0w186peveh816mkb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments