skill invocation
v1.0.0Choose the best OpenClaw skill by matching trigger keywords to the TOOLS.md index, then applying strict judgment rules (most specific first; if in doubt, use...
⭐ 0· 88·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name/description matches its behavior: it is a decision framework that reads an index (TOOLS.md) and candidate SKILL.md files to pick skills. It does not request unrelated binaries, env vars, or installs.
Instruction Scope
Runtime instructions require reading TOOLS.md and candidate SKILL.md files from the workspace and applying matching heuristics. This is coherent for a selector framework. Note: the fallback rule 'if in doubt, use it' can cause the orchestrator to invoke a candidate skill even when fit is uncertain, which could lead to unintended invocation of other skills (especially ones with broader privileges) if the index or triggers are imprecise.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes disk writes and executable installs and is appropriate for the described purpose.
Credentials
The skill declares no required environment variables, credentials, or config paths; the SKILL.md does not ask for secrets. Reading SKILL.md/TOOLS.md is proportional to the stated function.
Persistence & Privilege
always is false and autonomous invocation is allowed by default (normal). The skill does not request persistent presence or modification of other skills/configs.
Assessment
This skill is a lightweight decision framework and appears coherent. Before installing, ensure you maintain a correct TOOLS.md index and keep SKILL.md files free of sensitive information. Pay attention to the 'if in doubt, use it' fallback — it can cause the orchestrator to call a candidate skill even when fit is uncertain, so make triggers specific and consider adding an explicit verification step before invoking skills that have broad access or require credentials. If you rely on automation, test the index in a safe environment to confirm the selection heuristics behave as you expect.Like a lobster shell, security has layers — review code before you run it.
latestvk973cc93k5w39z48v6y4wf6vzh839dcc
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🦞 Clawdis
OSLinux · macOS · Windows
