API Rate Limiter Designer

PassAudited by ClawScan on May 1, 2026.

Overview

This instruction-only API rate-limiting helper is purpose-aligned; users should mainly protect access logs and review any copied commands, dependencies, and production rollout changes.

This skill is safe to use as an instruction-only design aid. Before copying examples, redact sensitive log data, review shell commands, pin and audit any suggested dependencies, configure Redis securely, and test rate-limit changes in staging before production rollout.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If users copy the examples, they may process sensitive or very large log files on their local system.

Why it was flagged

The skill documents shell pipelines for analyzing local access logs. These commands are read-oriented and purpose-aligned, but they still involve local command execution against user data.

Skill content
cat access.log | awk '{print $1}' | sort | uniq -c | sort -rn | head -20
Recommendation

Review commands before running them, use copies or samples of logs where possible, and avoid pointing examples at unrelated or privileged files.

What this means

Copying the example directly into a project could introduce dependency risk if packages are unpinned or unaudited.

Why it was flagged

The implementation example references third-party Node packages without versions or lockfiles. This is normal for illustrative code, but users copying it should manage dependency provenance.

Skill content
const rateLimit = require('express-rate-limit'); const RedisStore = require('rate-limit-redis'); const Redis = require('ioredis');
Recommendation

Pin package versions, use a lockfile, check package maintainers and advisories, and review generated implementation code before adopting it.

What this means

Users who paste the examples will execute local commands or add runnable service code to their applications.

Why it was flagged

The skill includes bash examples and implementation snippets. They are disclosed as examples and are central to the stated design/implementation purpose, with no hidden auto-execution shown.

Skill content
```bash # Analyze access logs for request patterns
Recommendation

Treat all generated commands and code as drafts: inspect them, test in a non-production environment, and adapt paths, Redis settings, and application limits to your environment.

What this means

Sensitive operational data could be included in prompts or local analysis if full logs are provided.

Why it was flagged

The skill expects access-log analysis. Logs may contain IP addresses, endpoints, user identifiers, or attacker-controlled request strings, even though the artifacts do not show persistent memory or sharing.

Skill content
Understand current API usage patterns: # Analyze access logs for request patterns
Recommendation

Use redacted or sampled logs when possible, avoid including secrets or personal data, and do not treat arbitrary log contents as instructions.

What this means

Incorrectly deployed limits could block legitimate API traffic, overload Redis, or cause inconsistent behavior across instances.

Why it was flagged

The skill provides guidance for global and distributed rate limiting. These controls are purpose-aligned, but a bad configuration can affect many users or instances at once.

Skill content
Global limits: Protect overall system capacity; For multi-instance deployments, use Redis-backed rate limiting
Recommendation

Test limits in staging, roll out gradually, monitor 429 rates and Redis health, and keep an emergency rollback or bypass plan.