低风险 — 风险评分 5/100
上次扫描:21 小时前 重新扫描
5 /100
intelligent-memory-trigger-system
Intelligent system that automatically determines when to create workflow documentation based on task complexity, repetition patterns, and user intent.
This skill is purely documentation-based with no executable code, scripts, or actual capabilities. It contains only Markdown files describing a workflow decision-making system with JavaScript pseudocode examples.
技能名称intelligent-memory-trigger-system
分析耗时24.5s
引擎pi
可以安装
No immediate action needed. The skill is safe to use as it contains no executable components. However, consider adding explicit allowed-tools declaration to SKILL.md for clarity.

安全发现 2 项

严重性 安全发现 位置
低危
No allowed-tools declaration 文档欺骗
SKILL.md does not include an allowed-tools declaration section, making it unclear what capabilities this skill would have if executed.
No allowed-tools field in frontmatter
→ Add an explicit allowed-tools section to clarify the skill's scope, even if declaring NONE
SKILL.md:1
低危
Hardcoded user paths in documentation 文档欺骗
Documentation references hardcoded Windows paths like C:\Users\sjh65\.openclaw\workspace\workflows\ which may not be relevant to all users.
return "C:\\Users\\sjh65\\.openclaw\\workspace\\workflows\\priority\"
→ Use environment variables or relative paths for cross-platform compatibility
memory-trigger-management.md:120
资源类型声明权限推断权限状态证据
文件系统 NONE NONE No file operations in skill code
网络访问 NONE NONE No network calls in skill
命令执行 NONE NONE No shell execution in skill
环境变量 NONE NONE No environment access in skill
技能调用 NONE NONE No skill invocation patterns found
剪贴板 NONE NONE No clipboard access in skill
浏览器 NONE NONE No browser access in skill
数据库 NONE NONE No database access in skill

目录结构

4 文件 · 33.1 KB · 999 行
Markdown 4f · 999L
├─ 📝 memory-trigger-management.md Markdown 291L · 9.4 KB
├─ 📝 SKILL.md Markdown 215L · 8.3 KB
├─ 📝 trigger-logic.md Markdown 321L · 9.5 KB
└─ 📝 usage-guide.md Markdown 172L · 5.9 KB

安全亮点

✓ No executable scripts or code files present in the skill
✓ No network requests or external communications detected
✓ No credential harvesting or sensitive data access
✓ No obfuscation techniques or suspicious encoding patterns
✓ No supply chain dependencies that could introduce vulnerabilities
✓ No persistence mechanisms or backdoors detected
✓ No prompt injection attempts or hidden instructions found
✓ Skill is purely documentation with pseudocode examples - no actual execution capability