Web3 & Blockchain Engineering

v1.0.0

Comprehensive methodology for designing, securing, and operating blockchain systems, including smart contracts, DeFi, tokenomics, and platform selection guid...

1· 558·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (blockchain engineering methodology) match the provided SKILL.md and README content. The skill provides design patterns, checklists, and decision frameworks appropriate to its stated purpose and does not request unrelated capabilities.
Instruction Scope
SKILL.md contains guidelines, YAML/solidity examples, decision trees and checklists. It does not instruct the agent to read local files, access environment variables, call external endpoints, or exfiltrate data. The guidance is scoped to design, security, and operational advice for blockchain projects.
Install Mechanism
No install spec and no code files — instruction-only. Because nothing is written to disk or downloaded, there is minimal install-time risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. Although the content discusses wallets and keys conceptually, the skill itself does not request secrets or unrelated credentials.
Persistence & Privilege
always is false and the skill is user-invocable; autonomous invocation is platform-default but not combined with other red flags here. The skill does not request persistent system presence or modify other skills.
Assessment
This skill is instruction-only and appears coherent for blockchain engineering. Before using: do not paste private keys, seed phrases, or other secrets into prompts; treat code samples and upgrade recommendations as starting points and review them with your own security/audit processes; verify external commercial links and offers before paying; if you plan to act on deployment or audit recommendations, perform those actions in controlled environments and follow your organization's secret-management procedures.

Like a lobster shell, security has layers — review code before you run it.

bitcoinvk97e3jtn00k8b6jvaehccv0qss81fz4pblockchainvk97e3jtn00k8b6jvaehccv0qss81fz4pdefivk97e3jtn00k8b6jvaehccv0qss81fz4pethereumvk97e3jtn00k8b6jvaehccv0qss81fz4platestvk97e3jtn00k8b6jvaehccv0qss81fz4psecurityvk97e3jtn00k8b6jvaehccv0qss81fz4psmart-contractvk97e3jtn00k8b6jvaehccv0qss81fz4psolidityvk97e3jtn00k8b6jvaehccv0qss81fz4ptokenomicsvk97e3jtn00k8b6jvaehccv0qss81fz4pweb3vk97e3jtn00k8b6jvaehccv0qss81fz4p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments