Adaptive Testing
v1.0.3Design and implement adaptive testing systems using Item Response Theory (IRT). Use when working with computerized adaptive tests (CAT), psychometric assessm...
⭐ 0· 535·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and included documents all focus on Item Response Theory and computerized adaptive testing. There are no required binaries, environment variables, or external services declared, which is appropriate for a documentation/instruction-only skill.
Instruction Scope
SKILL.md and referenced files contain detailed algorithms, calibration guidance, and example implementation code. The instructions remain on-topic (item selection, estimation, calibration, simulation, API patterns). They do mention handling student identifiers and item banks (expected for this domain) but do not instruct reading unrelated system files or exfiltrating data.
Install Mechanism
No install spec or code files to execute were provided; this is instruction-only, which minimizes installation risk.
Credentials
The skill declares no environment variables or credentials (appropriate). As a domain note: the guidance discusses handling student identifiers and item banks — deploying systems based on these instructions will require careful handling of PII, database credentials, and hosting credentials, but the skill itself does not request them.
Persistence & Privilege
Skill is not always-enabled and does not request persistent agent privileges or modify other skills. It can be invoked by the user and (platform-default) by models, which is expected for a helper skill.
Assessment
This is a documentation/instruction skill and appears internally consistent. Before using its example code in production, treat the samples as illustrative only: add authentication, session management, input validation, rate limiting, and database protections; encrypt and minimize storage of student identifiers to meet privacy laws (e.g., FERPA/GDPR); review item exposure controls and bias/fairness concerns; and run extensive simulation and security testing. The skill does not request secrets or install software, but any systems you build from it will need secure credentials and operational hardening — don't deploy the example API as-is to a public endpoint.Like a lobster shell, security has layers — review code before you run it.
latestvk97e7nspgdevkxxsfrdap5thbs81z68m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
