Elixir Performance Review
v1.2.0Reviews Elixir code for performance issues including GenServer bottlenecks, memory usage, and concurrency patterns. Use when reviewing high-throughput code o...
⭐ 0· 80·0 current·0 all-time
byKevin Anderson@anderskev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the contents: the skill is a code-review checklist and reference material for Elixir performance patterns. It requires no binaries, env vars, or external services, which is proportionate for a guidance-only skill.
Instruction Scope
SKILL.md and the included reference files confine guidance to reviewing Elixir code (GenServer, ETS, memory, concurrency). The only minor inconsistency: SKILL.md instructs the agent to "Load and follow [review-verification-protocol](../review-verification-protocol/SKILL.md)" before reporting issues, but that referenced file is not included in the manifest. This may be a broken/relative link (documentation bug) but not an obvious security concern.
Install Mechanism
No install spec or code files — instruction-only. Nothing is written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The guidance does not attempt to read or require unrelated secrets.
Persistence & Privilege
always:false and default autonomous invocation are used (normal). The skill does not request persistent privileges or modify other skills or system-wide settings.
Assessment
This skill is a documentation-only review checklist for Elixir performance and appears coherent and low-risk. Note the SKILL.md refers to a verification protocol file that isn't included — that is likely a documentation bug rather than malicious behavior. Before using the skill with real code, avoid pasting sensitive secrets or credentials into the agent prompts (the skill does not need them). If you rely on the missing review-verification-protocol, ask the publisher for the file or inspect whatever verification steps they expect before reporting issues.Like a lobster shell, security has layers — review code before you run it.
latestvk976b4cadgcqxpzdkrnmdb7dz583apf3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
