Start with the matrix. Open this section when you need to understand audit grades, top threats, control gaps, and best-value highlights.
Open notes
Suggested baseline
Suggested skills to compare
Convert Plaintext Documentation to Markdown
Repository: awesome-copilot
Author: github · Source status: Clear source
Score 82Clear source
Manual review
Convert a text-based document to markdown following instructions from prompt, or if a documented option is passed, follow the instructions for that option.
Score basis:Clear source · High execution risk · Claude · Evidence completeness 67%
Author unclaimed
Claude
Search to add skills, or paste 2–4 comma-separated slugs.
How differences are detected
A row is marked different when selected skills have distinct values. Only-differences mode hides rows that are identical.
How best values are highlighted
Pre-install score, evidence completeness, and community signal prefer higher values; execution risk and install friction prefer lower values.
How to read risk tags
Risk tags come from SAS-v2.1 public-evidence signals and point to command, network, secret, context, or supply-chain items to review before install.
Selected audit signals
site-to-md
C · Review first
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
skill-seekers
D · Limited evidence
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
Adaptive Memory
C · Review first
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
Dimension
site-to-md
skill-seekers
Adaptive Memory
Pre-install decision
Pre-install score
82 · Manual review
88 · Evidence missing
85 · Manual review
Score basis
Clear source, High execution risk, Universal
Clear source, High execution risk, Claude
Clear source, High execution risk, Universal
Execution risk
High
High
High
Threat tags
unexpected code execution, identity privilege abuse, data exfiltration
unexpected code execution, identity privilege abuse, data exfiltration
unexpected code execution, identity privilege abuse, data exfiltration
Control gaps
missing license, broad permissions, shell without guardrails
missing license, broad permissions, shell without guardrails
missing license, broad permissions, shell without guardrails
Expert translator from English to Central Kurdish (Sorani) for all Information Technology domains — including apps, operating systems, servers, networks, databases, UI/UX strings, developer tools, cloud platforms, and an
Snapshot and back up OpenClaw brain files (AGENTS.md, SOUL.md, MEMORY.md, memory/, etc.) to an offsite git repository — like a lobster shedding its shell, leaving behind a perfect copy before growing.
Trigger when: (1) User wants to extract text, tables, formulas, or structured data from images/PDFs/scanned documents, (2) User mentions "OCR", "文字识别", "文档解析", (3) User has a document (screenshot, scanned page, invoice,