Liveview Code Review

v1.2.0

Reviews Phoenix LiveView code for lifecycle patterns, assigns/streams usage, components, and security. Use when reviewing LiveView modules, .heex templates,...

0· 88·0 current·0 all-time
byKevin Anderson@anderskev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the content: the skill provides checklists and reference docs for reviewing Phoenix LiveView code. It does not request unrelated binaries, env vars, or permissions.
Instruction Scope
SKILL.md contains focused review instructions, examples, and a reporting format. It does reference an external file '../review-verification-protocol/SKILL.md' that is not included in this package — this is a minor inconsistency (missing referenced doc) but not a security concern by itself. The instructions do not ask the agent to read or exfiltrate unrelated system files or secrets.
Install Mechanism
No install spec or code is included (instruction-only), so nothing is written to disk or fetched during install.
Credentials
No environment variables, credentials, or config paths are requested. The skill's needs are minimal and proportional to its purpose.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills/settings. Autonomous invocation is allowed by default on the platform but is not a special privilege of this skill.
Assessment
This is an instruction-only checklist for reviewing Phoenix LiveView code and appears coherent and low-risk. Before using it, note that it references a review-verification-protocol file that isn't included — confirm what that protocol requires. Because the skill is just guidance, the main privacy consideration is what code you let your agent analyze: do not expose secrets, credentials, or production-only config when asking for automated reviews. If you integrate this skill into an agent that has repository access, review and approve any findings before applying code changes.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bk8vkr8sy9w4bp8640dvpmn83br69

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments