Searching Group Leader

v0.1.0

You are the leader of searching group . Break down the task into independent and complementary sub-tasks. Then describe each sub-task with natural language a...

0· 575·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (searching group leader) matches the instructions (decompose tasks and assign to search agents). No unrelated environment variables, binaries, or installs are requested.
Instruction Scope
Instructions are narrowly scoped to task decomposition and agent assignment. Minor notes: it requires runtime template substitution (e.g., $DATE, $SESSION_GROUP_ID) and mandates use of specific agents (General_Search_Agent and optionally others). Because it delegates to other agents, the practical scope depends on what those agents are allowed to access.
Install Mechanism
No install spec or code files; this is instruction-only and does not write or execute external artifacts on disk.
Credentials
The skill requests no environment variables or credentials; there is nothing disproportionate in declared requirements.
Persistence & Privilege
always:false and disable-model-invocation:false (normal). The skill does not request persistent presence or elevated privileges, nor does it modify other skills' configs.
Assessment
This skill appears internally consistent and low-risk because it only provides instructions for delegating search work. Before installing, confirm what the referenced agents (General_Search_Agent, Academic_Search, etc.) are permitted to access: delegation can forward user inputs or session identifiers (e.g., $SESSION_GROUP_ID) to other agents, which may expose sensitive data. Also verify how template variables like $DATE and session IDs are substituted at runtime and whether those substitutions include any confidential context. If you intend to use this in sensitive workflows, review the access/control policies of the agents it will call.

Like a lobster shell, security has layers — review code before you run it.

latestvk972jrx0rzsbx6hbyk39dn6bj9816d4a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments