Dev Environment
v2.0.4Reference tool for devtools — covers intro, quickstart, patterns and more. Quick lookup for Dev Environment concepts, best practices, and implementation patt...
⭐ 0· 137·0 current·0 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description describe a documentation/reference tool and the included SKILL.md and scripts provide only text outputs and help content. There are no unrelated requirements (no credentials, no external services), so the requested capabilities match the stated purpose.
Instruction Scope
SKILL.md explicitly states all commands output heredoc text with no network access or credentials. The runtime script implements those commands and only prints static documentation. Minor inconsistencies: SKILL.md version (2.0.3), registry version (2.0.4), and script VERSION (2.0.2) differ; the cheatsheet references a 'troubleshooting' command that isn't implemented. These are quality issues but do not expand scope or indicate malicious behavior.
Install Mechanism
No install spec is provided and the skill is instruction/script-only. No downloads, third-party package installs, or archive extraction occur. This is low-risk from an install mechanism perspective.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. The script also does not read environment variables or secret files. The credential/environment access is proportionate to a read-only reference tool.
Persistence & Privilege
always is false and the skill does not request persistent platform privileges or modify system/agent-wide settings. It is user-invocable and can be invoked autonomously per platform defaults; this is expected and acceptable given the limited scope.
Assessment
This skill appears to be a simple, read-only reference implemented as a shell script and markdown instructions. It does not request credentials or perform network calls. Before installing, you may want to: (1) note the small version mismatches in the metadata (harmless but signals minor maintenance issues); (2) review the script if you plan to run it in an environment with strict policies; and (3) run it in a sandbox or test account if you have high security requirements. Overall it is coherent with its stated purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk97d1j05bpt5b2zg3w6kqtdcf583grz3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
