Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Release Manager

v2.1.1

Release Manager

0· 532·6 current·6 all-time
byAlireza Rezvani@alirezarezvani
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description and included files (changelog_generator.py, version_bumper.py, release_planner.py) align with a release-management tool. However the README claims "No external dependencies required (uses only Python standard library)" while SKILL.md and code snippets show network calls (requests) and CI integrations — this is an internal inconsistency (reasonable for the purpose but misleading).
!
Instruction Scope
Runtime instructions and examples frequently reference reading git history, piping git log into the scripts, and calling external services (GitHub API via requests, curl to feature-flag endpoints). Those are coherent with release tooling, but the skill does not document required network access or credentials. The release_plan generator shows direct calls to api.github.com (which may require authentication for private repos) and the sample rollback plan includes curl/kubectl commands; the SKILL.md does not instruct how to safely run those or declare required tokens.
Install Mechanism
There is no install spec (instruction-only), so nothing is downloaded automatically — lower risk. However the README/SKILL.md claim no external dependencies while code examples use the 'requests' library and CI examples reference jq/gcloud/git/gh actions. That mismatch is a packaging/documentation inconsistency to clarify before use.
!
Credentials
The package declares no required environment variables or primary credential, yet instructions and code examples access external APIs (GitHub endpoints) and CI context variables (GITHUB_OUTPUT, github.repository). For private repos or higher-rate GitHub usage, a token is typically required (GITHUB_TOKEN/GH_TOKEN) but none are declared. This gap could cause unexpected network calls or failures and may prompt a user to provide credentials without guidance.
Persistence & Privilege
The skill is not always-enabled, does not request system-wide configs, and has no install step that writes files to system locations. It appears to be a local tooling package; no automatic persistent privileges are requested.
What to consider before installing
This skill largely does what it says (generate changelogs, recommend version bumps, produce release plans), but there are some red flags to check before installing: - Verify dependencies: open the Python files (release_planner.py especially) and confirm whether they import non-standard packages (e.g., requests). If so, the README claiming "no external dependencies" is incorrect — install those packages in a controlled environment (virtualenv) before running. - Network access and credentials: the release planner calls the GitHub API in examples. Decide whether you will run this against public repos only or private ones. For private repos or to avoid rate limits you may need to provide a GitHub token; the skill does not declare or request one, so plan how you'll supply credentials safely (CI secrets, not pasted into chat). - Review for subprocess/network effects: inspect the code for any subprocess, os.system, or exec usage that would run shell commands. The sample rollback JSON contains commands like kubectl, curl, and redis-cli — these are examples, but confirm scripts only generate commands rather than executing them automatically. - Run in a sandbox first: execute the scripts on a test checkout or sample data (assets/) to observe behavior and network calls before pointing them at production repositories or granting credentials. - Check provenance: the source/owner is unknown. Prefer tools from a known maintainer or fork and audit the code; if you will use this in CI, pin the repository and add dependency and security reviews. If you want, I can scan the actual Python files for network calls, subprocess usage, and external imports and produce a short summary of risky lines to review next.

Like a lobster shell, security has layers — review code before you run it.

latestvk970w0z90ahz1eb910316gtzjx82mvfw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Release Manager

Tier: POWERFUL
Category: Engineering
Domain: Software Release Management & DevOps

Overview

The Release Manager skill provides comprehensive tools and knowledge for managing software releases end-to-end. From parsing conventional commits to generating changelogs, determining version bumps, and orchestrating release processes, this skill ensures reliable, predictable, and well-documented software releases.

Core Capabilities

  • Automated Changelog Generation from git history using conventional commits
  • Semantic Version Bumping based on commit analysis and breaking changes
  • Release Readiness Assessment with comprehensive checklists and validation
  • Release Planning & Coordination with stakeholder communication templates
  • Rollback Planning with automated recovery procedures
  • Hotfix Management for emergency releases
  • Feature Flag Integration for progressive rollouts

Key Components

Scripts

  1. changelog_generator.py - Parses git logs and generates structured changelogs
  2. version_bumper.py - Determines correct version bumps from conventional commits
  3. release_planner.py - Assesses release readiness and generates coordination plans

Documentation

  • Comprehensive release management methodology
  • Conventional commits specification and examples
  • Release workflow comparisons (Git Flow, Trunk-based, GitHub Flow)
  • Hotfix procedures and emergency response protocols

Release Management Methodology

Semantic Versioning (SemVer)

Semantic Versioning follows the MAJOR.MINOR.PATCH format where:

  • MAJOR version when you make incompatible API changes
  • MINOR version when you add functionality in a backwards compatible manner
  • PATCH version when you make backwards compatible bug fixes

Pre-release Versions

Pre-release versions are denoted by appending a hyphen and identifiers:

  • 1.0.0-alpha.1 - Alpha releases for early testing
  • 1.0.0-beta.2 - Beta releases for wider testing
  • 1.0.0-rc.1 - Release candidates for final validation

Version Precedence

Version precedence is determined by comparing each identifier:

  1. 1.0.0-alpha < 1.0.0-alpha.1 < 1.0.0-alpha.beta < 1.0.0-beta
  2. 1.0.0-beta < 1.0.0-beta.2 < 1.0.0-beta.11 < 1.0.0-rc.1
  3. 1.0.0-rc.1 < 1.0.0

Conventional Commits

Conventional Commits provide a structured format for commit messages that enables automated tooling:

Format

<type>[optional scope]: <description>

[optional body]

[optional footer(s)]

Types

  • feat: A new feature (correlates with MINOR version bump)
  • fix: A bug fix (correlates with PATCH version bump)
  • docs: Documentation only changes
  • style: Changes that do not affect the meaning of the code
  • refactor: A code change that neither fixes a bug nor adds a feature
  • perf: A code change that improves performance
  • test: Adding missing tests or correcting existing tests
  • chore: Changes to the build process or auxiliary tools
  • ci: Changes to CI configuration files and scripts
  • build: Changes that affect the build system or external dependencies
  • breaking: Introduces a breaking change (correlates with MAJOR version bump)

Examples

feat(user-auth): add OAuth2 integration

fix(api): resolve race condition in user creation

docs(readme): update installation instructions

feat!: remove deprecated payment API
BREAKING CHANGE: The legacy payment API has been removed

Automated Changelog Generation

Changelogs are automatically generated from conventional commits, organized by:

Structure

# Changelog

## [Unreleased]
### Added
### Changed  
### Deprecated
### Removed
### Fixed
### Security

## [1.2.0] - 2024-01-15
### Added
- OAuth2 authentication support (#123)
- User preference dashboard (#145)

### Fixed
- Race condition in user creation (#134)
- Memory leak in image processing (#156)

### Breaking Changes
- Removed legacy payment API

Grouping Rules

  • Added for new features (feat)
  • Fixed for bug fixes (fix)
  • Changed for changes in existing functionality
  • Deprecated for soon-to-be removed features
  • Removed for now removed features
  • Security for vulnerability fixes

Metadata Extraction

  • Link to pull requests and issues: (#123)
  • Breaking changes highlighted prominently
  • Scope-based grouping: auth:, api:, ui:
  • Co-authored-by for contributor recognition

Version Bump Strategies

Version bumps are determined by analyzing commits since the last release:

Automatic Detection Rules

  1. MAJOR: Any commit with BREAKING CHANGE or ! after type
  2. MINOR: Any feat type commits without breaking changes
  3. PATCH: fix, perf, security type commits
  4. NO BUMP: docs, style, test, chore, ci, build only

Pre-release Handling

# Alpha: 1.0.0-alpha.1 → 1.0.0-alpha.2
# Beta: 1.0.0-alpha.5 → 1.0.0-beta.1  
# RC: 1.0.0-beta.3 → 1.0.0-rc.1
# Release: 1.0.0-rc.2 → 1.0.0

Multi-package Considerations

For monorepos with multiple packages:

  • Analyze commits affecting each package independently
  • Support scoped version bumps: @scope/package@1.2.3
  • Generate coordinated release plans across packages

Release Branch Workflows

Git Flow

main (production) ← release/1.2.0 ← develop ← feature/login
                                           ← hotfix/critical-fix

Advantages:

  • Clear separation of concerns
  • Stable main branch
  • Parallel feature development
  • Structured release process

Process:

  1. Create release branch from develop: git checkout -b release/1.2.0 develop
  2. Finalize release (version bump, changelog)
  3. Merge to main and develop
  4. Tag release: git tag v1.2.0
  5. Deploy from main

Trunk-based Development

main ← feature/login (short-lived)
    ← feature/payment (short-lived)  
    ← hotfix/critical-fix

Advantages:

  • Simplified workflow
  • Faster integration
  • Reduced merge conflicts
  • Continuous integration friendly

Process:

  1. Short-lived feature branches (1-3 days)
  2. Frequent commits to main
  3. Feature flags for incomplete features
  4. Automated testing gates
  5. Deploy from main with feature toggles

GitHub Flow

main ← feature/login
    ← hotfix/critical-fix

Advantages:

  • Simple and lightweight
  • Fast deployment cycle
  • Good for web applications
  • Minimal overhead

Process:

  1. Create feature branch from main
  2. Regular commits and pushes
  3. Open pull request when ready
  4. Deploy from feature branch for testing
  5. Merge to main and deploy

Feature Flag Integration

Feature flags enable safe, progressive rollouts:

Types of Feature Flags

  • Release flags: Control feature visibility in production
  • Experiment flags: A/B testing and gradual rollouts
  • Operational flags: Circuit breakers and performance toggles
  • Permission flags: Role-based feature access

Implementation Strategy

# Progressive rollout example
if feature_flag("new_payment_flow", user_id):
    return new_payment_processor.process(payment)
else:
    return legacy_payment_processor.process(payment)

Release Coordination

  1. Deploy code with feature behind flag (disabled)
  2. Gradually enable for percentage of users
  3. Monitor metrics and error rates
  4. Full rollout or quick rollback based on data
  5. Remove flag in subsequent release

Release Readiness Checklists

Pre-Release Validation

  • All planned features implemented and tested
  • Breaking changes documented with migration guide
  • API documentation updated
  • Database migrations tested
  • Security review completed for sensitive changes
  • Performance testing passed thresholds
  • Internationalization strings updated
  • Third-party integrations validated

Quality Gates

  • Unit test coverage ≥ 85%
  • Integration tests passing
  • End-to-end tests passing
  • Static analysis clean
  • Security scan passed
  • Dependency audit clean
  • Load testing completed

Documentation Requirements

  • CHANGELOG.md updated
  • README.md reflects new features
  • API documentation generated
  • Migration guide written for breaking changes
  • Deployment notes prepared
  • Rollback procedure documented

Stakeholder Approvals

  • Product Manager sign-off
  • Engineering Lead approval
  • QA validation complete
  • Security team clearance
  • Legal review (if applicable)
  • Compliance check (if regulated)

Deployment Coordination

Communication Plan

Internal Stakeholders:

  • Engineering team: Technical changes and rollback procedures
  • Product team: Feature descriptions and user impact
  • Support team: Known issues and troubleshooting guides
  • Sales team: Customer-facing changes and talking points

External Communication:

  • Release notes for users
  • API changelog for developers
  • Migration guide for breaking changes
  • Downtime notifications if applicable

Deployment Sequence

  1. Pre-deployment (T-24h): Final validation, freeze code
  2. Database migrations (T-2h): Run and validate schema changes
  3. Blue-green deployment (T-0): Switch traffic gradually
  4. Post-deployment (T+1h): Monitor metrics and logs
  5. Rollback window (T+4h): Decision point for rollback

Monitoring & Validation

  • Application health checks
  • Error rate monitoring
  • Performance metrics tracking
  • User experience monitoring
  • Business metrics validation
  • Third-party service integration health

Hotfix Procedures

Hotfixes address critical production issues requiring immediate deployment:

Severity Classification

P0 - Critical: Complete system outage, data loss, security breach

  • SLA: Fix within 2 hours
  • Process: Emergency deployment, all hands on deck
  • Approval: Engineering Lead + On-call Manager

P1 - High: Major feature broken, significant user impact

  • SLA: Fix within 24 hours
  • Process: Expedited review and deployment
  • Approval: Engineering Lead + Product Manager

P2 - Medium: Minor feature issues, limited user impact

  • SLA: Fix in next release cycle
  • Process: Normal review process
  • Approval: Standard PR review

Emergency Response Process

  1. Incident declaration: Page on-call team
  2. Assessment: Determine severity and impact
  3. Hotfix branch: Create from last stable release
  4. Minimal fix: Address root cause only
  5. Expedited testing: Automated tests + manual validation
  6. Emergency deployment: Deploy to production
  7. Post-incident: Root cause analysis and prevention

Rollback Planning

Every release must have a tested rollback plan:

Rollback Triggers

  • Error rate spike: >2x baseline within 30 minutes
  • Performance degradation: >50% latency increase
  • Feature failures: Core functionality broken
  • Security incident: Vulnerability exploited
  • Data corruption: Database integrity compromised

Rollback Types

Code Rollback:

  • Revert to previous Docker image
  • Database-compatible code changes only
  • Feature flag disable preferred over code rollback

Database Rollback:

  • Only for non-destructive migrations
  • Data backup required before migration
  • Forward-only migrations preferred (add columns, not drop)

Infrastructure Rollback:

  • Blue-green deployment switch
  • Load balancer configuration revert
  • DNS changes (longer propagation time)

Automated Rollback

# Example rollback automation
def monitor_deployment():
    if error_rate() > THRESHOLD:
        alert_oncall("Error rate spike detected")
        if auto_rollback_enabled():
            execute_rollback()

Release Metrics & Analytics

Key Performance Indicators

  • Lead Time: From commit to production
  • Deployment Frequency: Releases per week/month
  • Mean Time to Recovery: From incident to resolution
  • Change Failure Rate: Percentage of releases causing incidents

Quality Metrics

  • Rollback Rate: Percentage of releases rolled back
  • Hotfix Rate: Hotfixes per regular release
  • Bug Escape Rate: Production bugs per release
  • Time to Detection: How quickly issues are identified

Process Metrics

  • Review Time: Time spent in code review
  • Testing Time: Automated + manual testing duration
  • Approval Cycle: Time from PR to merge
  • Release Preparation: Time spent on release activities

Tool Integration

Version Control Systems

  • Git: Primary VCS with conventional commit parsing
  • GitHub/GitLab: Pull request automation and CI/CD
  • Bitbucket: Pipeline integration and deployment gates

CI/CD Platforms

  • Jenkins: Pipeline orchestration and deployment automation
  • GitHub Actions: Workflow automation and release publishing
  • GitLab CI: Integrated pipelines with environment management
  • CircleCI: Container-based builds and deployments

Monitoring & Alerting

  • DataDog: Application performance monitoring
  • New Relic: Error tracking and performance insights
  • Sentry: Error aggregation and release tracking
  • PagerDuty: Incident response and escalation

Communication Platforms

  • Slack: Release notifications and coordination
  • Microsoft Teams: Stakeholder communication
  • Email: External customer notifications
  • Status Pages: Public incident communication

Best Practices

Release Planning

  1. Regular cadence: Establish predictable release schedule
  2. Feature freeze: Lock changes 48h before release
  3. Risk assessment: Evaluate changes for potential impact
  4. Stakeholder alignment: Ensure all teams are prepared

Quality Assurance

  1. Automated testing: Comprehensive test coverage
  2. Staging environment: Production-like testing environment
  3. Canary releases: Gradual rollout to subset of users
  4. Monitoring: Proactive issue detection

Communication

  1. Clear timelines: Communicate schedules early
  2. Regular updates: Status reports during release process
  3. Issue transparency: Honest communication about problems
  4. Post-mortems: Learn from incidents and improve

Automation

  1. Reduce manual steps: Automate repetitive tasks
  2. Consistent process: Same steps every time
  3. Audit trails: Log all release activities
  4. Self-service: Enable teams to deploy safely

Common Anti-patterns

Process Anti-patterns

  • Manual deployments: Error-prone and inconsistent
  • Last-minute changes: Risk introduction without proper testing
  • Skipping testing: Deploying without validation
  • Poor communication: Stakeholders unaware of changes

Technical Anti-patterns

  • Monolithic releases: Large, infrequent releases with high risk
  • Coupled deployments: Services that must be deployed together
  • No rollback plan: Unable to quickly recover from issues
  • Environment drift: Production differs from staging

Cultural Anti-patterns

  • Blame culture: Fear of making changes or reporting issues
  • Hero culture: Relying on individuals instead of process
  • Perfectionism: Delaying releases for minor improvements
  • Risk aversion: Avoiding necessary changes due to fear

Getting Started

  1. Assessment: Evaluate current release process and pain points
  2. Tool setup: Configure scripts for your repository
  3. Process definition: Choose appropriate workflow for your team
  4. Automation: Implement CI/CD pipelines and quality gates
  5. Training: Educate team on new processes and tools
  6. Monitoring: Set up metrics and alerting for releases
  7. Iteration: Continuously improve based on feedback and metrics

The Release Manager skill transforms chaotic deployments into predictable, reliable releases that build confidence across your entire organization.

Files

15 total
Select a file
Select a file to preview.

Comments

Loading comments…