Excel / WPS Table Diagnosis
v1.0.0Diagnose spreadsheet structure and recommend practical Excel/WPS-compatible formulas and workflows for cleaning, lookup and matching, summarization, text and...
⭐ 0· 86·0 current·0 all-time
byWinston@winstonice-prog
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and included files (SKILL.md, WORKFLOW.md, examples, docs) align with a purely advisory spreadsheet-diagnosis skill. There are no unrelated credentials, binaries, or install steps requested.
Instruction Scope
SKILL.md limits behavior to inspecting table headers/sample rows, diagnosing issues, recommending formulas/workflows, and pausing before making direct changes. It does not instruct reading system files, accessing hidden endpoints, or exfiltrating data.
Install Mechanism
No install spec and no code files that would be fetched or executed. Being instruction-only minimizes on-disk risk.
Credentials
The skill requests no environment variables, credentials, or config paths. The requested resources are proportionate to an advisory spreadsheet skill.
Persistence & Privilege
always is false and there is no install or persistent agent modification. agents/openai.yaml sets allow_implicit_invocation: true, which allows implicit invocation metadata but does not elevate privileges or request persistent access to credentials.
Assessment
This skill is instruction-only and appears coherent and low-risk: it only asks for table headers/sample rows and provides advice before doing any direct edits. Before you use it, confirm you will paste only the non-sensitive sample data (no full confidential spreadsheets), and explicitly approve any execution steps the skill proposes. Note that the agent metadata allows implicit invocation in some UIs — if you prefer explicit control, check your platform settings so the skill cannot be invoked without your prompt. If you later integrate this with services that open or modify real workbook files or cloud storage, verify and restrict any added credentials to the minimum necessary.Like a lobster shell, security has layers — review code before you run it.
data-cleaningvk97ddde4pyxvc5j9r4aeaxv1gx83ws9zexcelvk97ddde4pyxvc5j9r4aeaxv1gx83ws9zformulavk97ddde4pyxvc5j9r4aeaxv1gx83ws9zlatestvk97ddde4pyxvc5j9r4aeaxv1gx83ws9zlookupvk97ddde4pyxvc5j9r4aeaxv1gx83ws9zspreadsheetvk97ddde4pyxvc5j9r4aeaxv1gx83ws9zworkflowvk97ddde4pyxvc5j9r4aeaxv1gx83ws9zwpsvk97ddde4pyxvc5j9r4aeaxv1gx83ws9z
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
