Communication Protocols
v1.0.0Provides comprehensive knowledge on communication protocols from physical to application layers, including frame formats, key mechanisms, development tips, a...
⭐ 0· 38·0 current·0 all-time
by@viewway
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md content: a comprehensive protocol reference across physical-to-application layers. The skill requests no credentials, binaries, or config paths — appropriate for an informational/reference skill.
Instruction Scope
SKILL.md contains protocol explanations, frame formats, development tips and lists of common tools (e.g., minicom, pyserial, i2cdetect, candump, lsusb, tcpdump). It does not instruct the agent to read user files, exfiltrate data, or call external endpoints; tool names appear only as usage recommendations.
Install Mechanism
No install spec and no code files — instruction-only skill with no downloads or extraction. This is the lowest-risk install posture and matches the stated purpose.
Credentials
The skill declares no environment variables, credentials, or config paths. That is proportionate for a documentation/reference skill and there are no hidden env accesses in the SKILL.md.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills. Autonomous invocation is allowed by platform default but the skill itself does not gain elevated privileges.
Assessment
This skill is a read-only technical reference and appears internally consistent and low-risk: it doesn't request credentials or install code. Before enabling, consider: (1) the source is unknown — if you require authoritative/updated content prefer a vendor or maintained source; (2) the SKILL.md mentions tools (e.g., tcpdump, minicom) which, if you or an agent actually runs them later, can access hardware or network interfaces — review any commands before executing; (3) if you allow autonomous agent invocation, ensure policies limit the agent from running host commands you don't approve. Otherwise the skill is appropriate as a documentation helper.Like a lobster shell, security has layers — review code before you run it.
latestvk979wqp4z1d1d646mzst6bb1vx842t8p
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
