language-detect

Detect the language of text using AI

3,891 stars

Best use case

language-detect is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Detect the language of text using AI

Teams using language-detect should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/expanso-language-detect/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/aronchick/expanso-language-detect/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/expanso-language-detect/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How language-detect Compares

Feature / Agentlanguage-detectStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Detect the language of text using AI

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# language-detect

Detect the language of text using AI

## Requirements

- Expanso Edge installed (`expanso-edge` binary in PATH)
- Install via: `clawhub install expanso-edge`

## Usage

### CLI Pipeline
```bash
# Run standalone
echo '<input>' | expanso-edge run pipeline-cli.yaml
```

### MCP Pipeline
```bash
# Start as MCP server
expanso-edge run pipeline-mcp.yaml
```

### Deploy to Expanso Cloud
```bash
expanso-cli job deploy https://skills.expanso.io/language-detect/pipeline-cli.yaml
```

## Files

| File | Purpose |
|------|---------|
| `skill.yaml` | Skill metadata (inputs, outputs, credentials) |
| `pipeline-cli.yaml` | Standalone CLI pipeline |
| `pipeline-mcp.yaml` | MCP server pipeline |

Related Skills

错敏信息检测 API (Sensitive Content Detection)

3891
from openclaw/skills

一个基于 FastAPI 的错敏信息检测服务,用于检测文本中的敏感词、错别字和规范表述问题。

Content Moderation & Analysis

bs-detector

3891
from openclaw/skills

Detects key claims in long messages and summarizes the real point. Uses NLP to find what someone is actually saying vs. what they want you to believe.

solana-scam-detector

3891
from openclaw/skills

Detect scam tokens on Solana before you trade. Checks ticker patterns, token age, and known scam mints. Read-only — no wallet signing required.

meshtastic-detection

3891
from openclaw/skills

Receive DETECTION_SENSOR_APP alerts from Meshtastic LoRa devices via USB. When the remote sensor GPIO triggers (preset target detected), store the event and alert the user immediately.

undetectable-ai

3891
from openclaw/skills

Make AI text undetectable. TypeScript CLI that scans ChatGPT, Claude, OpenClaw output for patterns flagged by GPTZero, Turnitin, Originality.ai, then auto-fixes them to pass as human-written. Use to bypass AI detection, evade checkers, or humanize text before submission.

pii-detect

3891
from openclaw/skills

Detect personally identifiable information (PII) in text

aws-idle-resource-detector

3891
from openclaw/skills

Detect AWS idle and zombie resources consuming cost with zero meaningful utilization

aws-cloudtrail-threat-detector

3891
from openclaw/skills

Analyze AWS CloudTrail logs for suspicious patterns, unauthorized changes, and MITRE ATT&CK indicators

azure-activity-log-detector

3891
from openclaw/skills

Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators

supply-chain-poison-detector

3891
from openclaw/skills

Helps detect supply chain poisoning in AI agent marketplace skills. Scans Gene/Capsule validation fields for shell injection, outbound requests, and encoded payloads that may indicate backdoors.

social-trust-manipulation-detector

3891
from openclaw/skills

Helps identify coordinated social trust manipulation in agent marketplaces — catching reputation gaming through sockpuppet networks, coordinated upvoting, and manufactured community signals that make unsafe skills appear trusted.

install-then-update-trap-detector

3891
from openclaw/skills

Helps detect the install-then-update attack pattern — where a skill passes initial security review cleanly, then silently introduces malicious behavior through an automatic update that bypasses re-audit. v1.1 adds cryptographic chain-of-custody verification for update sequences.