Migration Runbook Generator

v1.0.0

把迁移方案整理成 runbook,补齐切换窗口、前置检查、回滚与验收信号。;use for migration, runbook, rollback workflows;do not use for 执行数据库改动, 忽略回滚条件.

0· 100·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included resources: templates, spec.json, examples, and scripts/run.py implement structured runbook generation and simple audits. Requiring python3 is proportionate and expected.
Instruction Scope
SKILL.md confines behavior to generating documents and recommends using the local script or templates. The bundled script will read files from any input path the user supplies (single file or a directory) and can sample many text files—so the agent or user must avoid pointing it at sensitive system directories. The SKILL.md explicitly warns not to perform system writes/DB changes.
Install Mechanism
No external install/downloads are declared; the skill is instruction-only with a bundled Python script and uses only the standard library. No suspicious remote installs or URL fetches are present.
Credentials
The skill requests no environment variables, no credentials, and no config paths. This is appropriate for a local document-generation/audit helper.
Persistence & Privilege
always is false and the skill does not modify other skills or system-wide settings. The script can write an output file if invoked with --output, which is expected and proportional to its purpose.
Scan Findings in Context
[curl_pipe_bash] expected: The script contains a detection regex for curl | bash patterns (used to scan inputs). This is consistent with a pattern-audit feature, not an indicator the skill itself executes such commands.
[dangerous_rm] expected: A regex looking for risky rm -rf usage appears in the script's PATTERNS list for scanning audited content — expected for a tool that flags risky snippets.
[base64_exec] expected: Detection pattern for base64 decode piped to an interpreter is present so the tool can flag obfuscated exec patterns in scanned files; this is consistent with audit functionality.
[secret_like] expected: The script scans for secret-like assignments (api_key/token/password) and masks them in output — appropriate for detecting accidental secrets in provided inputs.
[private_url] expected: Pattern for private/internal URLs is used to flag potentially sensitive endpoints in scanned content; expected for a scanning/audit mode.
Assessment
This skill appears coherent and safe to inspect and use, but follow these precautions: 1) Only run the bundled script on directories/files you control or have permission to scan—do not point it at system roots or private credential stores, since it will read any text files you give it. 2) Use the --dry-run option or redirect output to avoid accidental writes when testing. 3) Review generated runbooks before using them to perform real-world changes (the skill explicitly warns not to execute DB changes). 4) If you need automated execution against live systems, require additional safeguards and explicit approvals—this skill is for drafting/auditing, not for performing system actions.

Like a lobster shell, security has layers — review code before you run it.

latestvk977vzmf9rpdt5cf7mchryv9vh8358cm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🚚 Clawdis
OSmacOS · Linux · Windows
Binspython3

Comments