Nm Archetypes Architecture Paradigm Service Based
v1.8.3Design coarse-grained service architecture for deployment independence without microservices complexity and overhead
⭐ 0· 84·1 current·1 all-time
by@athola
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description promise coarse-grained service-architecture guidance and the SKILL.md contains exactly that guidance (when to use, adoption steps, risks, deliverables). There are no unrelated environment variables, binaries, or install steps requested.
Instruction Scope
Instructions are high-level architecture and process guidance; they do not tell the agent to read system files, access environment variables, or transmit data to external endpoints. Troubleshooting notes mention generic CLI errors but do not execute or require system-level operations.
Install Mechanism
No install spec and no code files are present (instruction-only), so nothing is written to disk or downloaded by the skill itself.
Credentials
The skill declares no required env vars, credentials, or config paths. There is no disproportionate or unexplained access requested.
Persistence & Privilege
always is false and the skill is user-invocable with normal autonomous invocation allowed. It does not request persistent presence or the ability to modify other skills or system settings.
Assessment
This skill is essentially documentation and safe to enable: it only offers architectural recommendations and does not request secrets, install software, or perform actions. Before acting on its recommendations, remember that implementing them in your environment may require infrastructure changes, database migration strategies, and team governance—those operational activities are outside the skill and may need privileged access. If you later install the full Claude plugin referenced in the SKILL.md (for commands/hooks), review that plugin's permissions and any install scripts separately, as those could request additional access not present in this instruction-only skill.Like a lobster shell, security has layers — review code before you run it.
latestvk97465xhw39ycd71v8cf6fxy3184jd6y
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🏗️ Clawdis
