Chaos

v1.0.0

Controlled fault injection and resilience validation. Use when testing failover or dependency assumptions.

0· 60·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and SKILL.md all describe structured chaos-engineering guidance. There are no unrelated requirements (no binaries, env vars, or config paths), so requested capabilities align with the stated purpose.
Instruction Scope
The SKILL.md contains procedural steps (clarify goals, design experiments, verify, iterate) and instructs the agent to ask for context. It does not instruct the agent to read local files, access environment variables, execute binaries, or send data to external endpoints.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing is written to disk or downloaded, so install-risk is minimal.
Credentials
The skill declares no required environment variables, credentials, or config paths. While the skill asks the agent to request context from the user (e.g., environment, scale), it does not itself require or attempt to use secrets or system config.
Persistence & Privilege
always is false and the skill is user-invocable. Autonomous model invocation is allowed by default on the platform but here poses no added risk because the skill contains only guidance and no privileged operations.
Assessment
This skill is low-risk: it's purely a procedural guide for running chaos experiments and does not install code or request credentials. Before using it, be prepared to provide the agent with non-sensitive context (goals, allowed blast radius, observability). Do not share secrets or credentials in the chat. Also remember the skill only advises — it does not itself execute destructive tests; ensure any actual fault injection is done by trusted tooling and authorized operators following your organization's safety and rollback procedures.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d1w402r6y2pjgrp6c9tz6e583qe5w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments