OpenClaw: suspicious
VirusTotal: benign
StaticScan: unknown
OpenClaw: suspicious
The skill's content and required resources line up with its stated purpose (game‑theoretic analysis of crypto systems) and it has no installs or credential requests, but provenance inconsistencies and... [内容已截断]
VirusTotal: benign VT 报告
静态扫描: unknown
README 未提供
无文件信息
{
"latestVersion": {
"_creationTime": 1769651280027,
"_id": "k971vjnav9g64fd0zsp4yr2zax8044vz",
"changelog": "Initial release providing advanced game theory analysis tools for crypto and web3 protocols:\n\n- Strategic frameworks for analyzing tokenomics, governance, MEV, auctions, and incentive systems.\n- Analysis templates and core concepts (Nash equilibrium, mechanism design, Schelling points, etc.) tailored to crypto use cases.\n- Detailed common patterns (Tragedy of the Commons, Prisoner’s Dilemma, Moral Hazard) with DeFi and governance examples.\n- Reference documents for deeper study of game-theoretic models in crypto.\n- Practical guidance for identifying red flags and improving protocol incentive alignment.",
"changelogSource": "auto",
"createdAt": 1769651280027,
"parsed": {
"clawdis": {
"homepage": "https:\/\/github.com\/tedkaczynski-the-bot\/game-theory"
}
},
"version": "1.0.0"
},
"owner": {
"_creationTime": 0,
"_id": "publishers:missing",
"displayName": "sp0oby",
"handle": "sp0oby",
"image": "https:\/\/avatars.githubusercontent.com\/u\/39270883?v=4",
"kind": "user",
"linkedUserId": "kn7dhtgw99e1sm0c1gjajvgcfn7zz1c4"
},
"ownerHandle": "sp0oby",
"skill": {
"_creationTime": 1769651280027,
"_id": "kd71jbe2kcnhnphhrqdaxmzz7d805261",
"badges": [],
"createdAt": 1769651280027,
"displayName": "Game Theory",
"latestVersionId": "k971vjnav9g64fd0zsp4yr2zax8044vz",
"ownerUserId": "kn7dhtgw99e1sm0c1gjajvgcfn7zz1c4",
"slug": "game-theory",
"stats": {
"comments": 0,
"downloads": 1736,
"installsAllTime": 4,
"installsCurrent": 4,
"stars": 5,
"versions": 1
},
"summary": "Advanced game theory analysis for crypto protocols, DeFi mechanisms, governance systems, and strategic decision-making. Use when analyzing tokenomics, evaluating protocol incentives, predicting adversarial behavior, designing mechanisms, or understanding strategic interactions in web3.",
"tags": {
"latest": "k971vjnav9g64fd0zsp4yr2zax8044vz"
},
"updatedAt": 1772161967596
}
}