Listed Company Compliance
v1.0.1基于最新监管规则,提供中国上市公司独立董事、信息披露、重大资产重组等核心合规领域的专业管理助手。
⭐ 0· 135·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill name/description (Chinese listed-company compliance assistant) matches the included rules, checklists and document templates. There are no unrelated required binaries, env vars, or config paths.
Instruction Scope
SKILL.md tells the agent to consult the packaged rules/templates and to generate compliance documents. That stays within scope. Note: many templates include fields for personal identifiers (e.g., 身份证号) and other PII — the skill does not itself exfiltrate anything, but users and agents could be prompted to enter sensitive personal/company data when using templates, so exercise caution with what you paste into the agent or external systems.
Install Mechanism
No install spec and no code to run — instruction-only. This minimizes supply-chain risk (nothing is downloaded or written to disk by an installer).
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate request for secrets.
Persistence & Privilege
always is false and the skill does not request persistent/system-wide privileges or modify other skills' configs. Autonomous invocation is allowed (platform default) but the skill has no elevated privileges.
Scan Findings in Context
[no-findings] expected: The regex-based scanner found nothing to analyze — expected for an instruction-only skill that contains plaintext rules and templates. Absence of findings is not a substitute for manual review of content (e.g., PII fields in templates).
Assessment
This skill appears coherent and benign: it bundles regulatory guidance, checklists and templates for Chinese listed-company compliance and requests no credentials or installs. Before installing/use: (1) do not paste real personal identifiers (身份证号, bank/account numbers, etc.) or confidential documents into public prompts or third-party services; (2) treat outputs as informational only — consult a qualified lawyer or advisor for binding legal advice; (3) verify the author/source and review update.md/CHANGELOG to ensure materials are current with the latest regulations; (4) if you plan to automate generation or send documents externally, confirm you are not leaking sensitive data to other systems or networks.Like a lobster shell, security has layers — review code before you run it.
auditvk9785m87dzb8250tmb0fe1v62s8334wkchinavk9785m87dzb8250tmb0fe1v62s8334wkchinesevk9785m87dzb8250tmb0fe1v62s8334wkcompliancevk9785m87dzb8250tmb0fe1v62s8334wkcsrcvk9785m87dzb8250tmb0fe1v62s8334wkesgvk9785m87dzb8250tmb0fe1v62s8334wkinternal-controlvk9785m87dzb8250tmb0fe1v62s8334wkipovk9785m87dzb8250tmb0fe1v62s8334wklatestvk9785m87dzb8250tmb0fe1v62s8334wklisted-companyvk9785m87dzb8250tmb0fe1v62s8334wksecuritiesvk9785m87dzb8250tmb0fe1v62s8334wkshanghaivk9785m87dzb8250tmb0fe1v62s8334wkshenzhenvk9785m87dzb8250tmb0fe1v62s8334wk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
