Healthkit Code Review

v1.2.0

Reviews HealthKit code for authorization patterns, query usage, background delivery, and data type handling. Use when reviewing code with import HealthKit, H...

0· 84·0 current·0 all-time
byKevin Anderson@anderskev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the provided checklists and reference docs. The skill asks for no binaries, env vars, or installs — nothing requested is unrelated to reviewing HealthKit code.
Instruction Scope
SKILL.md and the reference files only instruct the agent how to review code for HealthKit-specific patterns (authorization, queries, background delivery, units). They do not direct the agent to read system files, access credentials, or transmit data to external endpoints.
Install Mechanism
No install spec or code files — instruction-only. This minimizes on-disk code execution risk and is appropriate for a review/checklist skill.
Credentials
The skill declares no environment variables, credentials, or config paths. There are no unexplained secret requests or cross-service credentials.
Persistence & Privilege
always is false and the skill does not request elevated/persistent privileges or modify other skills. Model invocation is allowed (the platform default) but that is not a concern here given the minimal footprint.
Assessment
This skill is an instruction-only HealthKit code-review checklist and reference set; it does not request credentials or install code. Before installing, consider: (1) it will analyze any code you pass to the agent — don't send production secrets or private data you don't want reviewed, (2) the guidance is best-practice advice, not an automated security guarantee — manually verify important changes, and (3) the skill can be invoked by the agent (platform default). If you need stricter control, restrict when the skill may be called or review its outputs before acting on them.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bjtbmykzw745hw0td90z99s83b77s

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments