ToolRouter Gateway
Repository: openclaw/skills
Author: neroagent · Source status: Clear source
Unified access to 150+ tools via ToolRouter API.
Score basis:Clear source · High risk signals · OpenClaw
Compare skills
Pick 2–4 skills and compare what really matters: fit, risk, install effort, and community signal.
Comparison matrix
Highlights show current best; tooltip explains diff/best rules.
SAS-v2.1 diff rules / risk tag notes
Start with the matrix. Open this section when you need to understand audit grades, top threats, control gaps, and best-value highlights.
Suggested baseline
Search to add skills, or paste 2–4 comma-separated slugs.
How differences are detected
A row is marked different when selected skills have distinct values. Only-differences mode hides rows that are identical.
How best values are highlighted
Audit score, evidence confidence, trust score, and community signal prefer higher values; execution risk and install friction prefer lower values.
How to read risk tags
Risk tags come from SAS-v2.1 public-evidence signals and point to command, network, secret, context, or supply-chain items to review before install.
Selected audit signals
App Connectors
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
Aliyun Rds Supabase
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
Ai Music Generator Free
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
| Dimension | App Connectors | Aliyun Rds Supabase | Ai Music Generator Free |
|---|---|---|---|
| SAS-v2.1 pre-install audit | |||
Audit grade | C · Review first | D · Limited evidence | C · Review first |
Execution risk | High | High | High |
Threat tags | unexpected code execution, identity privilege abuse, data exfiltration | unexpected code execution, identity privilege abuse, data exfiltration | unexpected code execution, identity privilege abuse, data exfiltration |
Control gaps | missing license, broad permissions, shell without guardrails | missing license, broad permissions, shell without guardrails | missing license, broad permissions, shell without guardrails |
Permission summary | Permission review, Network, Secrets, Command | Permission review, Network, Secrets, Command | Permission review, Network, Secrets, Command |
Evidence confidence | 65% | 69% | 67% |
| Source & provenance | |||
Provenance | openclaw/skills | openclaw/skills | openclaw/skills |
Category | Integrations & Connectors | Integrations & Connectors | Design & Content |
Freshness | |||
| Risk & trust | |||
Trust score | 85 | 85 | 85 |
Audit signals | |||
| Install & compatibility | |||
Supported tools | Universal | Universal | Cursor, OpenClaw |
Install method | script-backed | script-backed | script-backed |
Install friction | |||
| Community | |||
Stars | 0 | 0 | 0 |
Repository: openclaw/skills
Author: twinsgeeks · Source status: Clear source
Chemistry between AI agents — find chemistry through personality matching, chemistry scoring, and chemistry-driven connections.
Score basis:Clear source · High risk signals · Claude
Repository: openclaw/skills
Author: twinsgeeks · Source status: Clear source
Icebreaker prompts for AI agents — break the ice with personality-matched agents, icebreaker conversations, and icebreaker openers that actually work.
Score basis:Clear source · High risk signals · Claude
Repository: openclaw/skills
Author: graveyardprotocol · Source status: Clear source
Close empty Solana SPL token accounts and reclaim locked rent SOL back to your wallet, track Ghost Point earnings, claim SOUL tokens at the end of each weekly epoch, manage multiple encrypted wallets, and view lifetime a
Score basis:Clear source · High risk signals · OpenClaw
2026-03-31 |
2026-04-02 |
2026-03-31 |
needs credentials, network access, runs shell |
needs credentials, runs shell, writes files |
needs credentials, network access, runs shell, writes files |
Permission hints | verify source provenance before install | verify source provenance before install | verify source provenance before install |
|---|
65 |
65 |
65 |