Rapid Prototyper
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This instruction-only skill is coherent for fast MVP building, but users should review cloud credentials, package installs, analytics, database changes, and deployment commands before running them.
This skill appears safe to install as an instruction-only prototyping guide. Before following its workflow, review any npm/npx commands, use sandbox or test cloud accounts, keep secrets out of source control, confirm database changes, and prefer preview deployments before publishing a prototype to production.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Running the setup may execute newly downloaded package code and install tools on the user's machine.
The setup relies on downloading and running npm ecosystem tooling, including latest-tag packages and a global CLI install. This is expected for bootstrapping a Next.js/Vercel prototype, but it introduces normal package provenance risk.
npx create-next-app@latest my-app ... npx shadcn@latest init ... npm install -g vercel
Review commands before running them, prefer pinned versions for repeatable builds, and use trusted package registries and a disposable prototype environment when possible.
A user could unintentionally change a cloud database schema or publish a prototype publicly if these commands are run without review.
The reference workflow includes commands that can mutate a remote database schema and publish the app to production. This fits the MVP-building purpose, but these are higher-impact actions.
npx prisma db push # push schema to Supabase ... vercel --prod # production deploy
Confirm before database pushes or production deploys, use preview/staging projects first, and verify environment variables and target accounts.
Leaked or over-privileged credentials could expose the prototype's database or authentication configuration.
The generated app setup requires database and Clerk authentication credentials. The shown values are placeholders and the credential use is purpose-aligned, but these secrets grant account and data access.
DATABASE_URL=postgresql://postgres:password@db.xxx.supabase.co:5432/postgres ... CLERK_SECRET_KEY=sk_test_xxx
Use test credentials, do not commit .env.local files, scope permissions narrowly, and rotate keys if they are exposed.
Prototype user activity or feedback-related data may be collected by analytics providers depending on how the app is implemented.
The skill instructs adding third-party analytics and action logging to generated prototypes. This is normal for MVP validation, but it creates an external data flow that users should configure deliberately.
Add Vercel Analytics or PostHog from day one - Log key actions
Disclose analytics to testers, avoid logging sensitive data, configure retention and privacy settings, and disable telemetry if it is not needed.
