Chinese Wisdom

v1.0.0

Integrates Confucianism, Daoism, Mohism, Legalism, and Buddhism for daily self-cultivation, decision-making, and mindset adjustment guidance.

0· 99·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (integrating Confucianism, Daoism, Mohism, Legalism, Buddhism for self-cultivation and decision guidance) match the SKILL.md content. No unrelated capabilities or credentials are requested.
Instruction Scope
SKILL.md contains only descriptive guidance, quotes, tables, and practice suggestions. It does not instruct the agent to read files, access environment variables, contact external endpoints, or collect/transmit user data.
Install Mechanism
No install specification and no code files are present. Because this is instruction-only, nothing will be downloaded or written to disk by an installer step.
Credentials
No environment variables, credentials, or config paths are required. The requested permissions are proportional (none) to the stated purpose.
Persistence & Privilege
always is false and there is no indication the skill modifies other skills or system settings. Autonomous invocation is allowed by platform default but is not combined with elevated privileges here.
Assessment
This skill is instruction-only and appears internally consistent with its stated purpose. Consider: (1) the content is educational/advisory — do not use it as a substitute for professional legal/medical/financial advice; (2) the SKILL.md contains no provenance or citations — if you need authoritative sourcing, ask the author for references or preferred translations; (3) it will run as part of the agent when invoked (platform default), but it requests no credentials or installs, so there is no obvious exfiltration risk. If you plan to share sensitive personal information when using the skill, be aware the agent may include that in any outputs you authorize.

Like a lobster shell, security has layers — review code before you run it.

latestvk97antv7wstk19mjqvmchz8hh983mdw6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments