Perf Tools

v2.0.2

Reference tool for devtools — covers intro, quickstart, patterns and more. Quick lookup for Perf Tools concepts, best practices, and implementation patterns.

0· 106·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Perf Tools reference) align with included assets: SKILL.md describes plain-text reference commands and the script.sh implements those commands. No unrelated credentials, binaries, or cloud access are requested.
Instruction Scope
SKILL.md explicitly states outputs are plain-text heredocs with no external API calls or network access. The provided script simply prints embedded documentation and dispatches commands; it does not read external files, environment secrets, or transmit data.
Install Mechanism
There is no install spec and no downloads. The only code is a reasonable shell script included in the bundle; nothing in the manifest writes or executes remote code or pulls artifacts from untrusted URLs.
Credentials
The skill declares no required environment variables, credentials, or config paths. The script does not reference environment secrets or external service tokens.
Persistence & Privilege
always is false and the skill does not attempt to modify agent configuration or persist credentials. It does not request elevated/system-wide privileges.
Assessment
This skill appears coherent and low-risk: it provides local reference docs and the included script only outputs static text. Before installing, you may want to (1) review the script contents yourself (they're short and human-readable) — I noticed a minor mismatch: the script's VERSION variable is "2.0.0" while registry metadata is 2.0.2 (harmless but inconsistent); (2) confirm the source (the GitHub repo/homepage) if you require provenance; and (3) remember that although the skill doesn't request credentials or network access, any included script will run with the agent's runtime permissions — run only if you trust the source. No other red flags were found.

Like a lobster shell, security has layers — review code before you run it.

latestvk97drdzg0y8zvg5hrgxfhfj5mn83g5zh

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments