lycx-skill

v1.0.0

Summarizes long texts by extracting key points and producing concise summaries for documents, meetings, and reports without altering original meaning.

0· 213·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, SKILL.md, and the single Python file all describe text summarization; no unrelated environment variables, binaries, or config paths are requested.
Instruction Scope
Runtime instructions are limited to validating text length, calling a model to summarize, extracting key points, and returning structured output. They do not instruct reading files, credentials, or transmitting data to unexpected endpoints. The SKILL.md is scoped to summarization.
Install Mechanism
No install spec is provided (instruction-only plus a small local Python file). Nothing is downloaded or written to disk by an installer; low installation risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. The implementation does not reference any secrets or external endpoints.
Persistence & Privilege
always is false and the skill does not request persistent privileges or modify other skills/config. It does not require autonomous elevated presence.
Assessment
This skill appears internally consistent and low-risk: it contains only a small placeholder summarization function and no external integrations or credential requests. Before installing, confirm how your agent will perform 'calling the model' in practice — if the agent forwards user text to a third-party model provider, that transmits the text outside your environment (privacy risk). Also note the included Python implementation is a stub that returns a generic summary; verify which model or code your agent will actually use for real summarization and whether output logging or retention policies are acceptable. If you need stronger guarantees, require a local model or explicit provider settings and review their data handling terms.

Like a lobster shell, security has layers — review code before you run it.

latestvk974yjyy9v33qdrsh3g689cesh82mh10

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments