Zhou Hongyi Perspective V2

v1.0.0

周鸿祎思维视角 v2.0 · 360 集团创始人 核心心智模型:免费模式、用户思维、颠覆式创新、安全信仰、产品经理文化、流量思维、战斗文化、快速迭代、生态安全、红衣教主 用途:创业方向、竞争策略、产品战略、免费模式设计、安全业务规划 触发词:「用周鸿祎的视角」「周鸿祎会怎么看」「周鸿祎模式」「zhou hongy...

0· 56·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (a Zhou Hongyi-style business/strategy persona) align with the SKILL.md content: the file only defines role-play behavior, heuristics, examples and checks. There are no extraneous binaries, env vars, or installs that would be disproportionate to a persona skill.
Instruction Scope
Instructions are narrowly scoped to role-playing as Zhou Hongyi (tone, keywords, stop phrase). This is coherent, but it explicitly directs the agent to impersonate a real public figure using first-person voice and a single initial disclaimer; that raises content/ethics risks (misattribution, user misunderstanding, possible defamation or misrepresentation) rather than technical security issues.
Install Mechanism
No install spec, no code files, no downloads. Instruction-only skills have minimal technical footprint and nothing will be written to disk by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no disproportionate access to secrets or unrelated systems.
Persistence & Privilege
always is false and the skill does not request system-wide configuration changes. Autonomous invocation is allowed (platform default) but the skill does not request elevated persistence or cross-skill modifications.
Assessment
Technically this skill is coherent and low-risk: it only defines a role-playing persona and requires no installs or credentials. Before installing, consider non-technical risks: it impersonates a real public figure and will answer in first-person with sharp rhetoric — users may mistake its outputs for statements by the actual person, and tactical/business/security advice may be opinionated or incomplete. Do not rely on it for legal, financial, or critical security decisions without independent verification. If you install it, consider adding usage guidance for end users (clear, repeated disclaimers, require citations for factual claims, and avoid using outputs as authoritative statements) and confirm you are comfortable with the aggressive tone and potential ethical/legal implications of impersonation.

Like a lobster shell, security has layers — review code before you run it.

latestvk97aemqq47x18fazxsegjjdwt184arcz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments