Skills conflict-of-interest-checker
Check for co-authorship conflicts between authors and suggested reviewers
install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/aipoch-ai/conflict-of-interest-checker" ~/.claude/skills/openclaw-skills-conflict-of-interest-checker && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/aipoch-ai/conflict-of-interest-checker" ~/.openclaw/skills/openclaw-skills-conflict-of-interest-checker && rm -rf "$T"
manifest:
skills/aipoch-ai/conflict-of-interest-checker/SKILL.mdsource content
Conflict of Interest Checker
Reviewer conflict detection tool.
Use Cases
- Journal submission prep
- Editorial decisions
- Peer review integrity
- Compliance verification
Parameters
| Parameter | Type | Default | Required | Description |
|---|---|---|---|---|
, | string | - | Yes | Comma-separated author names |
, | string | - | Yes | Comma-separated reviewer names |
, | string | - | No | CSV file with publication records |
CSV Format
author,reviewer,paper_id Smith,Brown,paper1 Smith,Jones,paper2
Usage
# Check with demo data python scripts/main.py --authors "Smith,Jones,Lee" --reviewers "Brown,Davis,Wilson" # Check with publication records python scripts/main.py --authors "Smith,Jones" --reviewers "Brown,Davis" --publications pubs.csv
Returns
- Conflict flagging (coauthorship, institutional)
- Shared publication list
- Recommendation: Accept/Recuse
- Alternative reviewer suggestions
Example Output
⚠ Found 2 potential conflict(s): 1. COAUTHORSHIP CONFLICT Reviewer: Brown Author: Smith Shared papers: paper1 2. COAUTHORSHIP CONFLICT Reviewer: Wilson Author: Smith Shared papers: paper2
Risk Assessment
| Risk Indicator | Assessment | Level |
|---|---|---|
| Code Execution | Python/R scripts executed locally | Medium |
| Network Access | No external API calls | Low |
| File System Access | Read input files, write output files | Medium |
| Instruction Tampering | Standard prompt guidelines | Low |
| Data Exposure | Output files saved to workspace | Low |
Security Checklist
- No hardcoded credentials or API keys
- No unauthorized file system access (../)
- Output does not expose sensitive information
- Prompt injection protections in place
- Input file paths validated (no ../ traversal)
- Output directory restricted to workspace
- Script execution in sandboxed environment
- Error messages sanitized (no stack traces exposed)
- Dependencies audited
Prerequisites
No additional Python packages required.
Evaluation Criteria
Success Metrics
- Successfully executes main functionality
- Output meets quality standards
- Handles edge cases gracefully
- Performance is acceptable
Test Cases
- Basic Functionality: Standard input → Expected output
- Edge Case: Invalid input → Graceful error handling
- Performance: Large dataset → Acceptable processing time
Lifecycle Status
- Current Stage: Draft
- Next Review Date: 2026-03-06
- Known Issues: None
- Planned Improvements:
- Performance optimization
- Additional feature support