Teamgram MTProto Protocol

v1.0.1

Documents the MTProto protocol handling layer in Teamgram Server, including handshake, AES-IGE decryption, QuickAck, auth_key caching, and message forwarding...

0· 153·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the content: it's a reference describing handshake, AES-IGE decryption, QuickAck, auth_key caching, and message forwarding. No unrelated credentials, binaries, or capabilities are requested.
Instruction Scope
SKILL.md is strictly documentation and references code paths and runtime components for operator context. It does not instruct the agent to read local files, access credentials, or call external endpoints beyond referencing the public GitHub repo.
Install Mechanism
No install spec or code files are present; this is instruction-only so nothing is written to disk or fetched at install time.
Credentials
The skill declares no required environment variables, credentials, or config paths. The runtime component table merely documents what Teamgram Server deployments normally use (MySQL, Redis, etc.) and does not request access to them.
Persistence & Privilege
Skill is not forced-always and does not request elevated persistence or modify other skills/system settings. Autonomous invocation is enabled (default) but that is normal for user-invocable skills and not problematic here given the documentation-only nature.
Assessment
This skill is reference documentation only and appears coherent with its stated purpose. Before relying on it in a production environment, verify the referenced GitHub repository and specific code paths yourself (the SKILL.md points to teamgram-server on GitHub) and audit any server deployment for proper key storage, network exposure, and database access. If you plan to deploy Teamgram Server, follow your normal security review: confirm license compatibility, review auth_key handling in the actual source code, and avoid pasting secrets into any third-party skills or chat inputs. If you need the agent to fetch or run code from the repository, treat that as a separate action and review the code and network permissions first.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b9nrkkr4e9eeqv4x7m66y1h82zbqx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments