Agent Engineering
v1.0.0Design, build, deploy, and operate production AI agent systems — single agents, multi-agent teams, and autonomous swarms. Complete methodology from agent arc...
⭐ 0· 590·1 current·1 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description match the content: this is a methodology for designing, building, deploying, and operating production agents. It is instruction-only and does not request unrelated credentials, binaries, or system access, which is proportionate for a documentation/playbook skill.
Instruction Scope
SKILL.md is comprehensive and stays focused on agent architecture, memory patterns, workflows, guardrails, file templates, and operational practices. One instruction asks memory/log files to include the “Full source of all included files” and to review them for malicious behavior — this is reasonable for reviewing an agent workspace but is ambiguous about scope (workspace-only vs arbitrary host files). If an agent running these instructions were given broad filesystem/network privileges, it could prompt collection of unrelated files.
Install Mechanism
No install spec or code is included; this is instruction-only so nothing is downloaded or written by the skill itself. Low install risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. That aligns with a methodology/playbook and is proportionate.
Persistence & Privilege
The skill is not marked always:true and uses normal model invocation. It does instruct generation and maintenance of workspace/memory files (e.g., MEMORY.md, daily logs), which is expected for an agent operations guide; it does not request system-wide changes or access to other skills' credentials.
Assessment
This skill is a detailed playbook for building and operating agents and appears internally consistent. Before installing or using it, confirm you trust the publisher (no homepage is provided), and if you run agents built with these instructions: - Run them in a sandboxed environment so the agent cannot read arbitrary host files or secrets. - Restrict the agent’s filesystem scope to the agent workspace; do not grant broad / or home directory access. - Be cautious about any generated memory logs that include ‘full source’—redact secrets and limit collection to relevant workspace files. - Review any external links or paid ‘context packs’ before clicking or purchasing. If you need higher assurance, request the publisher’s source repo or license and inspect sample generated files to verify they only reference expected workspace artifacts.Like a lobster shell, security has layers — review code before you run it.
agentvk97bzt2k5f2s5rpvx85g0qc8d181dje8aivk97bzt2k5f2s5rpvx85g0qc8d181dje8automationvk97bzt2k5f2s5rpvx85g0qc8d181dje8latestvk97bzt2k5f2s5rpvx85g0qc8d181dje8multi-agentvk97bzt2k5f2s5rpvx85g0qc8d181dje8openclawvk97bzt2k5f2s5rpvx85g0qc8d181dje8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
