Apple HIG

v1.0.0

Apple Human Interface Guidelines 实战参考。涵盖 macOS/iOS 设计规范、System Colors、排版层级、控件规格、布局间距、Dark Mode 适配、辅助功能和平台差异。适用于开发 macOS 桌面应用(Electron/SwiftUI/AppKit)和 iOS 应用...

0· 569·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Apple HIG guidelines) match the actual content: a static, detailed SKILL.md with design rules for macOS/iOS. There are no unrelated credentials, binaries, or configuration requirements that would be unnecessary for a design reference.
Instruction Scope
SKILL.md is purely documentation and runtime instructions are absent — it does not instruct the agent to read files, access environment variables, call external endpoints, or perform system operations outside providing design guidance.
Install Mechanism
No install spec and no code files — nothing is downloaded or written to disk. This is the lowest-risk pattern for a skill of this type.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate for a read-only design guideline resource.
Persistence & Privilege
always is false and the skill does not request persistent or system-wide privileges. The default ability for the agent to invoke the skill autonomously is normal and does not materially expand capabilities here because the skill has no external actions or credentials.
Assessment
This skill is an offline/reference-style guide — low risk because it contains only design text and asks for nothing. Before relying on it as authoritative, cross-check critical details against Apple's official HIG (apple.com/design/human-interface-guidelines) because third-party summaries can be slightly out-of-date or simplified. If you expect the skill to perform actions (linting, code generation, automated checks), note that those capabilities are not present — additional tools, binaries, or credentials would be required and should be reviewed before installation.

Like a lobster shell, security has layers — review code before you run it.

latestvk974spykbybs0ws5b0rb7n3bmh8233y2

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments