secondary-style-perturbation
v1.0.0对已初步处理的文本进行二次轻微扰动。用于第一轮重写后需要进一步降低风格一致性特征时使用。
⭐ 0· 48·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (secondary light style perturbation after a first rewrite) align with the SKILL.md instructions. There are no unexpected required binaries, environment variables, or config paths.
Instruction Scope
The SKILL.md stays within the stated purpose and gives fine-grained transform rules (rhythm, synonym replacement, pronoun variation, slight logical jumps) and clear output constraints (only the perturbed text). Two cautions: (1) introducing '轻微逻辑跳跃' while '不添加新信息' can be hard to guarantee and may inadvertently change meaning; (2) the transformations are exactly the kind of processing that can be used to evade authorship/style-detection systems — this is a contextual misuse risk, not an incoherence in the skill itself.
Install Mechanism
Instruction-only skill with no install spec and no code files; nothing is written to disk and no external packages are fetched.
Credentials
The skill requests no environment variables, credentials, or config paths — access requirements are minimal and proportionate.
Persistence & Privilege
always is false and the skill does not request persistent or elevated platform privileges.
Assessment
This skill is internally coherent and low-privilege: it only prescribes local text transformations and requests no credentials or installs. Before using it, consider ethical and practical risks: the transforms are suited to evading style or authorship detectors and may unintentionally alter nuance or introduce factual ambiguity despite saying not to add information. If you plan to use this on sensitive, attributed, or legally protected text, review the output manually, ensure you have the right to modify the text, and keep audit logs of original/modified versions. If you need stronger guarantees that meaning isn’t changed, test the skill on representative samples and refuse use when high fidelity is required.Like a lobster shell, security has layers — review code before you run it.
latestvk973sd9z1b3s95npm92x3kj59h83yvzs
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
