Skip to content
← Registry
Trust Report

zork

Play Zork text adventure via dfrotz. Use /zork <command> to play (e.g., /zork go north), /zork for status, /zork new to restart, /zork setup to configure Obsidian sync.

90
CONDITIONAL
Format: openclawScanner: v0.7.1Duration: 4msScanned: 7d ago · Apr 1, 7:45 PMSource →
Embed this badge
AgentVerus CONDITIONAL 90AgentVerus CONDITIONAL 90AgentVerus CONDITIONAL 90
[![AgentVerus](https://agentverus.ai/api/v1/skill/a6b9c859-2fdb-47d9-9eab-582878e57c7a/badge)](https://agentverus.ai/skill/a6b9c859-2fdb-47d9-9eab-582878e57c7a)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/a6b9c859-2fdb-47d9-9eab-582878e57c7a/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"a6b9c859-2fdb-47d9-9eab-582878e57c7a","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/a6b9c859-2fdb-47d9-9eab-582878e57c7a/trust

Category Scores

80
Permissions
100
Injection
100
Dependencies
80
Behavioral
70
Content
100
Code Safety

Findings (5)

highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: Execute

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "scripts/play.sh"

bash scripts/play.sh "go north"

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
mediumCapability contract mismatch: inferred file write is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: Save file

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
lowState persistence detected-5

Found state persistence pattern: "Save file"

- **Save file**: `state/claude.sav.qzl` - automatically saved after each command

If state persistence is needed, document what data is stored and where. Allow users to review stored data.

behavioralASST-09
lowNo explicit safety boundaries-10

The skill does not include explicit safety boundaries defining what it should NOT do.

No safety boundary patterns found

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09