Computer Vision Expert

v1.0.0

SOTA Computer Vision Expert (2026). Specialized in YOLO26, Segment Anything 3 (SAM 3), Vision Language Models, and real-time spatial analysis.

2· 4.4k·40 current·41 all-time
byZorro Ng@zorrong
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (YOLO26, SAM 3, VLMs, deployment/optimization guidance) match the SKILL.md content. The skill requests no binaries, env vars, or config paths — which is appropriate for a purely advisory/architecture role. (Note: the skill's source/homepage are unspecified, which affects provenance but not internal coherence.)
Instruction Scope
SKILL.md contains high-level design and engineering guidance only; it does not instruct the agent to read local files, access environment variables, call external endpoints, or execute commands. There are no runtime directives or data-exfiltration patterns in the instructions.
Install Mechanism
No install specification or code files are present. Being instruction-only means nothing is written to disk by the skill itself — lowest install risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. Requested capabilities (model names and deployment targets) do not imply the skill needs secrets or unrelated credentials.
Persistence & Privilege
always is false and the skill has normal invocation settings. It does not request persistent presence or system configuration changes.
Assessment
This skill is a read-only expert guide and is low-risk to install. Before following its recommendations in practice, be careful when you: (1) download model weights or third-party artifacts — obtain them from official/verified releases and check licenses; (2) run example commands or snippets — review code before executing, especially if it downloads or runs binaries; (3) deploy to cloud or edge devices — avoid sharing credentials or private data with third parties. The skill's provenance is unspecified, so prefer trusted sources when acting on its implementation guidance.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e9ra4mhc57fag2bmgnky6vd80j6z8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments