IPO Model
v1.0.0输入处理输出结构递归嵌套模型 — 万物基元与世界模型。 一切任务均可分解为 输入→处理→输出 的递归嵌套结构,任意层级的任意节点均可继续展开为子IPO。 不使用工具时:用IPO分析问题、生成产物(纯认知输出)。 使用工具时:在IPO分析产物基础上,进一步用IPO生成命令、脚本,调用 Tool / Skill /...
⭐ 0· 43·0 current·0 all-time
by波动几何@wangjiaocheng
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description describe an abstract IPO methodology; the skill is instruction-only and requests no binaries, env vars, or config paths. All declared metadata and examples align with a cognitive/methodology skill.
Instruction Scope
SKILL.md instructs the agent how to analyze tasks into IPO units and, when appropriate, to generate commands/scripts and call tools/skills/MCPs. Those instructions are scoped to the stated purpose (applying IPO to tasks). The doc does mention reading files / calling APIs as examples when a task requires them, which is expected for a tool-enhanced workflow.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing will be written to disk by installing this skill.
Credentials
The skill requests no environment variables, credentials, or config paths. Examples reference calling external tools/skills only when appropriate to a user task.
Persistence & Privilege
always is false and there are no self-modifying install steps. The skill may be invoked autonomously by the agent (platform default), which is expected for a workflow/analysis skill; no elevated persistence is requested.
Assessment
This skill is a purely conceptual runtime instruction set for decomposing tasks using an IPO framework and is coherent with its description. It does, however, describe generating and (when requested) executing commands/scripts or calling other Tools/Skills/MCPs as part of tool-enhanced workflows — which can perform file I/O or network operations depending on the tools invoked. Before enabling or using it in an agent that can act autonomously, consider: review generated commands/scripts before execution; restrict or audit which external Skills/MCP connectors the agent may call; avoid granting sensitive credentials to connectors unless you trust the destination; and disable autonomous invocation if you do not want the agent to run tool calls without explicit confirmation.Like a lobster shell, security has layers — review code before you run it.
latestvk970czbrz86dvjsjscfhdh4qz184xd3h
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
