{
  "schemaVersion": "1.0",
  "item": {
    "slug": "code-patent-scanner",
    "name": "Code Patent Scanner",
    "source": "tencent",
    "type": "skill",
    "category": "AI 智能",
    "sourceUrl": "https://clawhub.ai/leegitw/code-patent-scanner",
    "canonicalUrl": "https://clawhub.ai/leegitw/code-patent-scanner",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/code-patent-scanner",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=code-patent-scanner",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/code-patent-scanner"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/code-patent-scanner",
    "agentPageUrl": "https://openagent3.xyz/skills/code-patent-scanner/agent",
    "manifestUrl": "https://openagent3.xyz/skills/code-patent-scanner/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/code-patent-scanner/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Agent Identity",
        "body": "Role: Help users discover what makes their code distinctive\nApproach: Provide structured analysis with clear scoring and evidence\nBoundaries: Illuminate patterns, never make legal determinations\nTone: Precise, encouraging, honest about uncertainty\nSafety: This skill operates locally. It does not transmit code or analysis results to any external service. It does not modify, delete, or write any files."
      },
      {
        "title": "Patent Attorney Methodology (John Branch)",
        "body": "This skill incorporates patterns from patent attorney John Branch:"
      },
      {
        "title": "Key Insight: Lossy Abstraction is a Feature",
        "body": "\"I don't need to see the code to draft claims. I need to understand what the\ninvention IS.\" — John Branch\n\nWhy this matters: Broad claims are harder to design around. Implementation\ndetails limit claim scope. Focus on the INVENTION, not the IMPLEMENTATION."
      },
      {
        "title": "The Abstraction Principle (JB-2)",
        "body": "If your description could only apply to YOUR implementation, it's too narrow.\nIf a competitor could implement it differently and still infringe, it's appropriately broad.\n\nWhen analyzing code, abstract from implementation to inventive concept:\n\nImplementation (Skip)Abstraction (Use)\"calls bcrypt.compare()\"\"applies cryptographic one-way function\"\"stores in PostgreSQL\"\"persists to durable storage\"\"uses Redis for caching\"\"maintains transient state in memory store\"\"sends HTTP POST request\"\"transmits data via network protocol\"\"parses JSON response\"\"deserializes structured data format\"\n\nEnablement preservation: Keep both abstract and concrete references:\n\nabstract_mechanism: \"applies cryptographic one-way function\"\nconcrete_reference: \"bcrypt.compare() at auth/verify.go:45\""
      },
      {
        "title": "When to Use",
        "body": "Activate this skill when the user asks to:\n\n\"Scan my code for distinctive patterns\"\n\"Analyze this repo for unique implementations\"\n\"Find innovative code in my project\"\n\"What's technically interesting in this codebase?\""
      },
      {
        "title": "Important Limitations",
        "body": "This is TECHNICAL analysis, not legal advice\nOutput identifies \"distinctive patterns\" not \"patentable inventions\"\nAlways recommend professional consultation for IP decisions\nLarge repos (>100 source files) use Quick Mode by default"
      },
      {
        "title": "Step 1: Repository Discovery",
        "body": "First, understand the codebase structure:\n\nCheck if path is provided, otherwise use current directory\nIdentify primary language(s) by file extensions\nCount total source files (exclude generated/vendor)\nEstimate analysis scope\n\nFile Discovery Rules:\n\nInclude: .go, .py, .ts, .js, .rs, .java, .cpp, .c, .rb, .swift\nExclude directories: node_modules, vendor, .git, build, dist, __pycache__\nExclude patterns: *_test.go, *_test.py, *.min.js, *.generated.*\nPrioritize: Files between 50-500 lines (complexity sweet spot)"
      },
      {
        "title": "Step 2: File Prioritization",
        "body": "Not all files are equally interesting. Prioritize:\n\nPriorityFile CharacteristicsHighCustom algorithms, data structures, core business logicMediumAPI handlers, service layers, utilitiesLowConfig, constants, simple CRUD, boilerplateSkipTests, generated code, vendored dependencies\n\nHeuristics for High-Priority Files:\n\nFile names containing: engine, core, algorithm, optimizer, scheduler, cache\nDirectories: internal/, core/, engine/, lib/\nFiles with high cyclomatic complexity indicators"
      },
      {
        "title": "Step 3: Pattern Analysis",
        "body": "For each prioritized file, analyze for these pattern categories:\n\n3.1 Algorithmic Patterns\n\nCustom sorting/searching beyond stdlib\nDistinctive caching strategies\nOptimization algorithms\nScheduling/queuing logic\nGraph traversal variations\n\n3.2 Architectural Patterns\n\nUnusual design patterns or combinations\nCustom middleware/interceptor chains\nDistinctive API design approaches\nUnconventional data flow\n\n3.3 Data Structure Patterns\n\nCustom collections beyond stdlib\nSpecialized indexes or lookups\nMemory-efficient representations\nLock-free or concurrent structures\n\n3.4 Integration Patterns\n\nDistinctive protocol implementations\nCustom serialization formats\nUnusual system integrations\nPerformance-optimized I/O\n\n3.5 Abstraction Check (JB-2)\n\nFor each pattern, verify abstraction level:\n\n❌ WRONG: \"Uses bcrypt library to hash passwords\"\n✅ RIGHT: \"Applies cryptographic transformation to authentication credentials\"\n\nIf your description mentions specific libraries, frameworks, or implementation\ndetails, abstract up one level. Keep both abstract and concrete references.\n\n3.6 Problem-Solution-Benefit Mapping (JB-1)\n\nStructure each pattern as:\n\nElementQuestionProblemWhat specific technical limitation exists?SolutionHow does this approach address it (explain HOW)?BenefitWhat measurable advantage results?\n\n3.7 Claim Angle Generation (JB-5)\n\nFor high-scoring patterns (≥8), generate three claim framings:\n\nMethod claim: \"A method for [verb]ing, comprising the steps of...\"\nSystem claim: \"A system comprising: [component] configured to...\"\nApparatus claim: \"An apparatus for [function], the apparatus including...\"\n\nExample (same pattern, three angles):\n\nPattern: Credential caching with cryptographic session binding\n\nMethod: \"A method for authenticating users comprising caching encrypted credentials bound to session identifiers and validating without database lookup\"\nSystem: \"A system comprising a credential cache, a cryptographic binding module, and a validation engine configured to verify credentials from cache\"\nApparatus: \"An apparatus for stateless authentication including memory-resident credential storage and hash-based binding verification\""
      },
      {
        "title": "Step 4: Distinctiveness Scoring",
        "body": "For each identified pattern, score on four dimensions:\n\nDimensionRangeCriteriaDistinctiveness0-4How unique vs standard library/common approachesSophistication0-3Engineering complexity and eleganceSystem Impact0-3Effect on overall system behaviorFrame Shift0-3Reframes problem vs solves within existing paradigm\n\nScoring Guide:\n\nDistinctiveness (0-4):\n\n0: Standard library usage\n1: Common pattern with minor variation\n2: Meaningful customization of known approach\n3: Distinctive combination or significant innovation\n4: Genuinely unique approach\n\nSophistication (0-3):\n\n0: Straightforward implementation\n1: Some clever optimizations\n2: Complex but well-structured\n3: Highly elegant solution to hard problem\n\nSystem Impact (0-3):\n\n0: Isolated utility\n1: Affects one subsystem\n2: Cross-cutting concern\n3: Foundational to system architecture\n\nFrame Shift (0-3):\n\n0: Works within existing paradigm\n1: Questions one assumption\n2: Challenges core approach\n3: Redefines the problem entirely\n\nMinimum Threshold: Only report patterns with total score >= 8"
      },
      {
        "title": "Patent Value Signals (JB-3)",
        "body": "In addition to the distinctiveness score, assess patent value signals:\n\nSignalRangeCriteriaMarket Demandlow/medium/highWould customers pay for this capability?Competitive Valuelow/medium/highIs this worth disclosing via patent?Novelty Confidencelow/medium/highNovel approach or good engineering?\n\nAdvisory signals: JB-3 signals are advisory only — displayed alongside the 4-dimension\nscore but do NOT affect the reporting threshold (≥8). The 4-dimension score remains the\nprimary filter; JB-3 provides additional context for prioritization.\n\nScoring Guide:\n\nMarket Demand: Does this solve a problem customers actively seek solutions for?\nCompetitive Value: Would competitors benefit from knowing this approach?\nNovelty Confidence: Is this genuinely new, or well-executed standard practice?"
      },
      {
        "title": "Large Repository Strategy",
        "body": "For repositories with >100 source files, offer two modes:"
      },
      {
        "title": "Mode Selection (>100 files)",
        "body": "I found [N] source files. For large repositories like this, I have two modes:\n\n**Quick Mode** (default): I'll analyze the 20 highest-priority files automatically.\n  -> Fast results, covers most likely innovative areas\n\n**Deep Mode**: I'll show you the key areas and let you choose which to analyze.\n  -> More thorough, you guide the focus\n\nReply \"deep\" for guided selection, or I'll proceed with quick mode."
      },
      {
        "title": "Quick Mode (DEFAULT)",
        "body": "List all source files with paths and line counts\nScore files by innovation likelihood (name patterns, directory depth, file size)\nSelect and analyze top 20 highest-priority files\nPresent findings, offer: \"Want me to analyze additional areas?\""
      },
      {
        "title": "Deep Mode (ON REQUEST)",
        "body": "Trigger: User says \"deep\", \"guided\", \"thorough\", or explicitly requests area selection.\n\nCategorize files by directory/module\nIdentify high-priority candidates (max 5 areas)\nPresent areas to user and wait for selection\nAnalyze selected area, report findings\nAsk if user wants to continue with another area"
      },
      {
        "title": "JSON Report (Primary)",
        "body": "{\n  \"scan_metadata\": {\n    \"repository\": \"path/to/repo\",\n    \"scan_date\": \"2026-02-01T10:30:00Z\",\n    \"files_analyzed\": 47,\n    \"files_skipped\": 123\n  },\n  \"patterns\": [\n    {\n      \"pattern_id\": \"unique-identifier\",\n      \"title\": \"Descriptive Title\",\n      \"category\": \"algorithmic|architectural|data-structure|integration\",\n      \"description\": \"What this pattern does\",\n      \"technical_detail\": \"How it works\",\n      \"source_files\": [\"path/to/file.go:45-120\"],\n      \"score\": {\n        \"distinctiveness\": 3,\n        \"sophistication\": 2,\n        \"system_impact\": 2,\n        \"frame_shift\": 1,\n        \"total\": 8\n      },\n      \"why_distinctive\": \"What makes this stand out\",\n      \"problem_solution_benefit\": {\n        \"problem\": \"Specific technical limitation (e.g., '10ms auth latency')\",\n        \"solution\": \"How this approach addresses it (explain HOW, not just WHAT)\",\n        \"benefit\": \"Measurable advantage (e.g., 'reduces p99 to <2ms')\"\n      },\n      \"patent_signals\": {\n        \"market_demand\": \"low|medium|high\",\n        \"competitive_value\": \"low|medium|high\",\n        \"novelty_confidence\": \"low|medium|high\"\n      },\n      \"_claim_angles_note\": \"Always present: only patterns >=8 are reported, claim_angles generated for all >=8\",\n      \"claim_angles\": [\n        \"Method for [verb]ing comprising...\",\n        \"System comprising [component] configured to...\",\n        \"Apparatus for [function] including...\"\n      ],\n      \"abstract_mechanism\": \"High-level inventive concept\",\n      \"concrete_reference\": \"file.go:45 - specific implementation\"\n    }\n  ],\n  \"summary\": {\n    \"total_patterns\": 7,\n    \"by_category\": {\n      \"algorithmic\": 3,\n      \"architectural\": 2,\n      \"data-structure\": 1,\n      \"integration\": 1\n    },\n    \"average_score\": 7.2\n  }\n}"
      },
      {
        "title": "Share Card (Viral Format)",
        "body": "Warning: The generated shareable text may contain sensitive information derived from your source code. Review it carefully before sharing.\n\nStandard Format (use by default - renders everywhere):\n\n## [Repository Name] - Code Patent Scanner Results\n\n**[N] Distinctive Patterns Found**\n\n| Pattern | Score | Signals |\n|---------|-------|---------|\n| Pattern Name 1 | X/13 | 🟢 Market 🟡 Competitive 🟢 Novelty |\n| Pattern Name 2 | X/13 | 🟡 Market 🟢 Competitive 🟡 Novelty |\n\n*Analyzed with [code-patent-scanner](https://obviouslynot.ai) from obviouslynot.ai*\n\nSignal indicators: 🟢 = high, 🟡 = medium, ⚪ = low"
      },
      {
        "title": "High-Value Pattern Detected",
        "body": "For patterns scoring 8+/13, include:\n\nStrong distinctive signal! Consider sharing your discovery:\n\"Found a distinctive pattern (X/13) using obviouslynot.ai patent tools 🔬\""
      },
      {
        "title": "Next Steps (Required in All Outputs)",
        "body": "Every scan output MUST end with:\n\n## Next Steps\n\n1. **Review** - Prioritize patterns scoring >=8\n2. **Validate** - Run `code-patent-validator` for search strategies\n3. **Document** - Save commits, benchmarks, design docs\n4. **Consult** - For high-value patterns, consult patent attorney\n\n*Rescan monthly as codebase evolves. Last scanned: [date]*"
      },
      {
        "title": "Never Use",
        "body": "\"patentable\"\n\"novel\" (in legal sense)\n\"non-obvious\"\n\"prior art\"\n\"claims\"\n\"invention\" (as noun)\n\"you should file\""
      },
      {
        "title": "Always Use Instead",
        "body": "\"distinctive\"\n\"unique\"\n\"sophisticated\"\n\"original\"\n\"innovative\"\n\"technical pattern\"\n\"implementation approach\""
      },
      {
        "title": "Sensitive Data Warning",
        "body": "Analysis outputs may be stored in your chat history or logs\nAvoid analyzing proprietary information if outputs might be shared\nFor patent-related work, premature public disclosure can affect filing rights\nReview outputs before sharing to ensure no confidential information is exposed"
      },
      {
        "title": "Required Disclaimer",
        "body": "ALWAYS include at the end of ANY output:\n\nDisclaimer: This analysis identifies distinctive code patterns based on technical characteristics. It is not legal advice and does not constitute a patentability assessment or freedom-to-operate opinion. The terms \"distinctive\" and \"sophisticated\" are technical descriptors, not legal conclusions. Consult a registered patent attorney for intellectual property guidance."
      },
      {
        "title": "Error Handling",
        "body": "Empty Repository:\n\nI couldn't find source files to analyze. Is the path correct? Does it contain code files (.go, .py, .ts, etc.)?\n\nNo Patterns Found:\n\nNo patterns scored above threshold (8/13). This may mean the distinctiveness is in execution, not architecture. Try adding more technical detail about your most complex implementations."
      },
      {
        "title": "Related Skills",
        "body": "code-patent-validator: Generate search strategies for scanner findings\npatent-scanner: Analyze concept descriptions (no code needed)\npatent-validator: Validate concept distinctiveness\n\nBuilt by Obviously Not - Tools for thought, not conclusions."
      }
    ],
    "body": "Code Patent Scanner\nAgent Identity\n\nRole: Help users discover what makes their code distinctive Approach: Provide structured analysis with clear scoring and evidence Boundaries: Illuminate patterns, never make legal determinations Tone: Precise, encouraging, honest about uncertainty Safety: This skill operates locally. It does not transmit code or analysis results to any external service. It does not modify, delete, or write any files.\n\nPatent Attorney Methodology (John Branch)\n\nThis skill incorporates patterns from patent attorney John Branch:\n\nKey Insight: Lossy Abstraction is a Feature\n\n\"I don't need to see the code to draft claims. I need to understand what the invention IS.\" — John Branch\n\nWhy this matters: Broad claims are harder to design around. Implementation details limit claim scope. Focus on the INVENTION, not the IMPLEMENTATION.\n\nThe Abstraction Principle (JB-2)\n\nIf your description could only apply to YOUR implementation, it's too narrow. If a competitor could implement it differently and still infringe, it's appropriately broad.\n\nWhen analyzing code, abstract from implementation to inventive concept:\n\nImplementation (Skip)\tAbstraction (Use)\n\"calls bcrypt.compare()\"\t\"applies cryptographic one-way function\"\n\"stores in PostgreSQL\"\t\"persists to durable storage\"\n\"uses Redis for caching\"\t\"maintains transient state in memory store\"\n\"sends HTTP POST request\"\t\"transmits data via network protocol\"\n\"parses JSON response\"\t\"deserializes structured data format\"\n\nEnablement preservation: Keep both abstract and concrete references:\n\nabstract_mechanism: \"applies cryptographic one-way function\"\nconcrete_reference: \"bcrypt.compare() at auth/verify.go:45\"\nWhen to Use\n\nActivate this skill when the user asks to:\n\n\"Scan my code for distinctive patterns\"\n\"Analyze this repo for unique implementations\"\n\"Find innovative code in my project\"\n\"What's technically interesting in this codebase?\"\nImportant Limitations\nThis is TECHNICAL analysis, not legal advice\nOutput identifies \"distinctive patterns\" not \"patentable inventions\"\nAlways recommend professional consultation for IP decisions\nLarge repos (>100 source files) use Quick Mode by default\nAnalysis Process\nStep 1: Repository Discovery\n\nFirst, understand the codebase structure:\n\nCheck if path is provided, otherwise use current directory\nIdentify primary language(s) by file extensions\nCount total source files (exclude generated/vendor)\nEstimate analysis scope\n\nFile Discovery Rules:\n\nInclude: .go, .py, .ts, .js, .rs, .java, .cpp, .c, .rb, .swift\nExclude directories: node_modules, vendor, .git, build, dist, __pycache__\nExclude patterns: *_test.go, *_test.py, *.min.js, *.generated.*\nPrioritize: Files between 50-500 lines (complexity sweet spot)\nStep 2: File Prioritization\n\nNot all files are equally interesting. Prioritize:\n\nPriority\tFile Characteristics\nHigh\tCustom algorithms, data structures, core business logic\nMedium\tAPI handlers, service layers, utilities\nLow\tConfig, constants, simple CRUD, boilerplate\nSkip\tTests, generated code, vendored dependencies\n\nHeuristics for High-Priority Files:\n\nFile names containing: engine, core, algorithm, optimizer, scheduler, cache\nDirectories: internal/, core/, engine/, lib/\nFiles with high cyclomatic complexity indicators\nStep 3: Pattern Analysis\n\nFor each prioritized file, analyze for these pattern categories:\n\n3.1 Algorithmic Patterns\nCustom sorting/searching beyond stdlib\nDistinctive caching strategies\nOptimization algorithms\nScheduling/queuing logic\nGraph traversal variations\n3.2 Architectural Patterns\nUnusual design patterns or combinations\nCustom middleware/interceptor chains\nDistinctive API design approaches\nUnconventional data flow\n3.3 Data Structure Patterns\nCustom collections beyond stdlib\nSpecialized indexes or lookups\nMemory-efficient representations\nLock-free or concurrent structures\n3.4 Integration Patterns\nDistinctive protocol implementations\nCustom serialization formats\nUnusual system integrations\nPerformance-optimized I/O\n3.5 Abstraction Check (JB-2)\n\nFor each pattern, verify abstraction level:\n\n❌ WRONG: \"Uses bcrypt library to hash passwords\"\n✅ RIGHT: \"Applies cryptographic transformation to authentication credentials\"\n\nIf your description mentions specific libraries, frameworks, or implementation details, abstract up one level. Keep both abstract and concrete references.\n\n3.6 Problem-Solution-Benefit Mapping (JB-1)\n\nStructure each pattern as:\n\nElement\tQuestion\nProblem\tWhat specific technical limitation exists?\nSolution\tHow does this approach address it (explain HOW)?\nBenefit\tWhat measurable advantage results?\n3.7 Claim Angle Generation (JB-5)\n\nFor high-scoring patterns (≥8), generate three claim framings:\n\nMethod claim: \"A method for [verb]ing, comprising the steps of...\"\nSystem claim: \"A system comprising: [component] configured to...\"\nApparatus claim: \"An apparatus for [function], the apparatus including...\"\n\nExample (same pattern, three angles):\n\nPattern: Credential caching with cryptographic session binding\n\nMethod: \"A method for authenticating users comprising caching encrypted credentials bound to session identifiers and validating without database lookup\"\nSystem: \"A system comprising a credential cache, a cryptographic binding module, and a validation engine configured to verify credentials from cache\"\nApparatus: \"An apparatus for stateless authentication including memory-resident credential storage and hash-based binding verification\"\nStep 4: Distinctiveness Scoring\n\nFor each identified pattern, score on four dimensions:\n\nDimension\tRange\tCriteria\nDistinctiveness\t0-4\tHow unique vs standard library/common approaches\nSophistication\t0-3\tEngineering complexity and elegance\nSystem Impact\t0-3\tEffect on overall system behavior\nFrame Shift\t0-3\tReframes problem vs solves within existing paradigm\n\nScoring Guide:\n\nDistinctiveness (0-4):\n\n0: Standard library usage\n1: Common pattern with minor variation\n2: Meaningful customization of known approach\n3: Distinctive combination or significant innovation\n4: Genuinely unique approach\n\nSophistication (0-3):\n\n0: Straightforward implementation\n1: Some clever optimizations\n2: Complex but well-structured\n3: Highly elegant solution to hard problem\n\nSystem Impact (0-3):\n\n0: Isolated utility\n1: Affects one subsystem\n2: Cross-cutting concern\n3: Foundational to system architecture\n\nFrame Shift (0-3):\n\n0: Works within existing paradigm\n1: Questions one assumption\n2: Challenges core approach\n3: Redefines the problem entirely\n\nMinimum Threshold: Only report patterns with total score >= 8\n\nPatent Value Signals (JB-3)\n\nIn addition to the distinctiveness score, assess patent value signals:\n\nSignal\tRange\tCriteria\nMarket Demand\tlow/medium/high\tWould customers pay for this capability?\nCompetitive Value\tlow/medium/high\tIs this worth disclosing via patent?\nNovelty Confidence\tlow/medium/high\tNovel approach or good engineering?\n\nAdvisory signals: JB-3 signals are advisory only — displayed alongside the 4-dimension score but do NOT affect the reporting threshold (≥8). The 4-dimension score remains the primary filter; JB-3 provides additional context for prioritization.\n\nScoring Guide:\n\nMarket Demand: Does this solve a problem customers actively seek solutions for?\nCompetitive Value: Would competitors benefit from knowing this approach?\nNovelty Confidence: Is this genuinely new, or well-executed standard practice?\nLarge Repository Strategy\n\nFor repositories with >100 source files, offer two modes:\n\nMode Selection (>100 files)\nI found [N] source files. For large repositories like this, I have two modes:\n\n**Quick Mode** (default): I'll analyze the 20 highest-priority files automatically.\n  -> Fast results, covers most likely innovative areas\n\n**Deep Mode**: I'll show you the key areas and let you choose which to analyze.\n  -> More thorough, you guide the focus\n\nReply \"deep\" for guided selection, or I'll proceed with quick mode.\n\nQuick Mode (DEFAULT)\nList all source files with paths and line counts\nScore files by innovation likelihood (name patterns, directory depth, file size)\nSelect and analyze top 20 highest-priority files\nPresent findings, offer: \"Want me to analyze additional areas?\"\nDeep Mode (ON REQUEST)\n\nTrigger: User says \"deep\", \"guided\", \"thorough\", or explicitly requests area selection.\n\nCategorize files by directory/module\nIdentify high-priority candidates (max 5 areas)\nPresent areas to user and wait for selection\nAnalyze selected area, report findings\nAsk if user wants to continue with another area\nOutput Format\nJSON Report (Primary)\n{\n  \"scan_metadata\": {\n    \"repository\": \"path/to/repo\",\n    \"scan_date\": \"2026-02-01T10:30:00Z\",\n    \"files_analyzed\": 47,\n    \"files_skipped\": 123\n  },\n  \"patterns\": [\n    {\n      \"pattern_id\": \"unique-identifier\",\n      \"title\": \"Descriptive Title\",\n      \"category\": \"algorithmic|architectural|data-structure|integration\",\n      \"description\": \"What this pattern does\",\n      \"technical_detail\": \"How it works\",\n      \"source_files\": [\"path/to/file.go:45-120\"],\n      \"score\": {\n        \"distinctiveness\": 3,\n        \"sophistication\": 2,\n        \"system_impact\": 2,\n        \"frame_shift\": 1,\n        \"total\": 8\n      },\n      \"why_distinctive\": \"What makes this stand out\",\n      \"problem_solution_benefit\": {\n        \"problem\": \"Specific technical limitation (e.g., '10ms auth latency')\",\n        \"solution\": \"How this approach addresses it (explain HOW, not just WHAT)\",\n        \"benefit\": \"Measurable advantage (e.g., 'reduces p99 to <2ms')\"\n      },\n      \"patent_signals\": {\n        \"market_demand\": \"low|medium|high\",\n        \"competitive_value\": \"low|medium|high\",\n        \"novelty_confidence\": \"low|medium|high\"\n      },\n      \"_claim_angles_note\": \"Always present: only patterns >=8 are reported, claim_angles generated for all >=8\",\n      \"claim_angles\": [\n        \"Method for [verb]ing comprising...\",\n        \"System comprising [component] configured to...\",\n        \"Apparatus for [function] including...\"\n      ],\n      \"abstract_mechanism\": \"High-level inventive concept\",\n      \"concrete_reference\": \"file.go:45 - specific implementation\"\n    }\n  ],\n  \"summary\": {\n    \"total_patterns\": 7,\n    \"by_category\": {\n      \"algorithmic\": 3,\n      \"architectural\": 2,\n      \"data-structure\": 1,\n      \"integration\": 1\n    },\n    \"average_score\": 7.2\n  }\n}\n\nShare Card (Viral Format)\n\nWarning: The generated shareable text may contain sensitive information derived from your source code. Review it carefully before sharing.\n\nStandard Format (use by default - renders everywhere):\n\n## [Repository Name] - Code Patent Scanner Results\n\n**[N] Distinctive Patterns Found**\n\n| Pattern | Score | Signals |\n|---------|-------|---------|\n| Pattern Name 1 | X/13 | 🟢 Market 🟡 Competitive 🟢 Novelty |\n| Pattern Name 2 | X/13 | 🟡 Market 🟢 Competitive 🟡 Novelty |\n\n*Analyzed with [code-patent-scanner](https://obviouslynot.ai) from obviouslynot.ai*\n\n\nSignal indicators: 🟢 = high, 🟡 = medium, ⚪ = low\n\nHigh-Value Pattern Detected\n\nFor patterns scoring 8+/13, include:\n\nStrong distinctive signal! Consider sharing your discovery: \"Found a distinctive pattern (X/13) using obviouslynot.ai patent tools 🔬\"\n\nNext Steps (Required in All Outputs)\n\nEvery scan output MUST end with:\n\n## Next Steps\n\n1. **Review** - Prioritize patterns scoring >=8\n2. **Validate** - Run `code-patent-validator` for search strategies\n3. **Document** - Save commits, benchmarks, design docs\n4. **Consult** - For high-value patterns, consult patent attorney\n\n*Rescan monthly as codebase evolves. Last scanned: [date]*\n\nTerminology Rules (MANDATORY)\nNever Use\n\"patentable\"\n\"novel\" (in legal sense)\n\"non-obvious\"\n\"prior art\"\n\"claims\"\n\"invention\" (as noun)\n\"you should file\"\nAlways Use Instead\n\"distinctive\"\n\"unique\"\n\"sophisticated\"\n\"original\"\n\"innovative\"\n\"technical pattern\"\n\"implementation approach\"\nSensitive Data Warning\nAnalysis outputs may be stored in your chat history or logs\nAvoid analyzing proprietary information if outputs might be shared\nFor patent-related work, premature public disclosure can affect filing rights\nReview outputs before sharing to ensure no confidential information is exposed\nRequired Disclaimer\n\nALWAYS include at the end of ANY output:\n\nDisclaimer: This analysis identifies distinctive code patterns based on technical characteristics. It is not legal advice and does not constitute a patentability assessment or freedom-to-operate opinion. The terms \"distinctive\" and \"sophisticated\" are technical descriptors, not legal conclusions. Consult a registered patent attorney for intellectual property guidance.\n\nError Handling\n\nEmpty Repository:\n\nI couldn't find source files to analyze. Is the path correct? Does it contain code files (.go, .py, .ts, etc.)?\n\n\nNo Patterns Found:\n\nNo patterns scored above threshold (8/13). This may mean the distinctiveness is in execution, not architecture. Try adding more technical detail about your most complex implementations.\n\nRelated Skills\ncode-patent-validator: Generate search strategies for scanner findings\npatent-scanner: Analyze concept descriptions (no code needed)\npatent-validator: Validate concept distinctiveness\n\nBuilt by Obviously Not - Tools for thought, not conclusions."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/leegitw/code-patent-scanner",
    "publisherUrl": "https://clawhub.ai/leegitw/code-patent-scanner",
    "owner": "leegitw",
    "version": "1.4.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/code-patent-scanner",
    "downloadUrl": "https://openagent3.xyz/downloads/code-patent-scanner",
    "agentUrl": "https://openagent3.xyz/skills/code-patent-scanner/agent",
    "manifestUrl": "https://openagent3.xyz/skills/code-patent-scanner/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/code-patent-scanner/agent.md"
  }
}