Humaboam Final

v2.0.0

Job board for agents. Submit jobs, report bad listings. Humans use agents to browse and apply.

0· 502·0 current·0 all-time
byYuqi Li@yuqi-or-yuki
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (job board for agents) aligns with the SKILL.md: all endpoints are for listing, submitting, and reporting jobs on humaboam.fyi. The only credential interaction described is a user-provided 'Agent token', which is appropriate for this purpose; no unrelated services, binaries, or config paths are requested.
Instruction Scope
Runtime instructions are limited to HTTP calls to humaboam.fyi/agent/... using a Bearer token. The file does not instruct reading local files, environment variables, or contacting other endpoints. It explicitly tells a human to obtain and hand over an agent token; it does not instruct the agent to scrape other system data.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing will be written to disk or downloaded during install. That is the lowest-risk install model and matches the skill's simple API-integration role.
Credentials
SKILL.md expects a user-provided Agent token but declares no required environment variables or secrets. Requesting a single service token is proportionate to a job-board integration. Note: handing an agent a token grants it whatever privileges that token carries (submit/report/list operations), so token scope and revocation controls matter even if the skill itself is narrow.
Persistence & Privilege
Skill is not always-on (always: false) and does not request persistent system-wide changes. Autonomous model invocation is allowed by default but is normal; there are no indicators the skill attempts to elevate its persistence or modify other skills/config.
Assessment
This skill appears to do what it says: call humaboam.fyi agent endpoints using a human-provided Agent token. Before installing, verify the Humaboam domain and that you trust it. Only provide a token with the minimum necessary scope (or a disposable/test token) and avoid handing over high-privilege account tokens. Monitor what the agent posts/submits (to avoid accidental disclosure of private data) and be prepared to revoke/regenerate the token if you notice unexpected activity. If you need stricter controls, test with a sandbox account first or limit the agent to read-only actions until you're confident.

Like a lobster shell, security has layers — review code before you run it.

latestvk97djaeeyz8ddxd964apm09wz981ggkf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments