ket

v1.0.0

Guides development of KET (A2 Key for Schools) exam preparation and English learning applications. Supports both English beginners (Pre-A1, A1) and KET prep learners. Use when building listening, speaking, reading, or writing features, Cambridge A2 learning apps, or beginner-friendly English practice.

1· 1.8k·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (KET exam prep) match the SKILL.md content (detailed curriculum, module breakdown, UI and grading suggestions). There are no unrelated requirements (no env vars, binaries, or config paths).
Instruction Scope
SKILL.md contains design guidance, sample item types, grading criteria, and checklists; it does not instruct the agent to read files, call external endpoints, access system paths, or exfiltrate data. Instructions stay within the pedagogical/design scope.
Install Mechanism
No install spec and no code files are present (instruction-only), so nothing will be written to disk or fetched at install time.
Credentials
The skill declares no required environment variables, credentials, or config paths—requested access is minimal and appropriate for a documentation/guidance skill.
Persistence & Privilege
always is false and the skill does not request persistent or elevated agent privileges. It can be invoked normally by the agent, which is expected behavior for user-invocable instruction skills.
Assessment
This skill is an instruction-only design guide for KET/A2 app development and appears internally consistent and low-risk. Before enabling it: 1) note the source is unknown—prefer skills from known authors if you need accountability; 2) test its outputs for curriculum accuracy and local policy compliance before using in production; 3) never provide credentials or private data to a skill unless required and clearly explained (this skill does not request any); 4) monitor any autonomous invocations in case the agent uses the guidance to take actions you didn't expect (the skill itself does not perform external actions).

Like a lobster shell, security has layers — review code before you run it.

latestvk975m36m6vb2ccf7rhktvbj0hn80a50g

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments