Cost Opt
v1.0.0Cloud cost review: rightsizing, reservations, waste. Use when reducing infra spend.
⭐ 0· 54·0 current·0 all-time
by@clawkk
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description describe a structured cost-optimization workflow and the skill is instruction-only with no extra permissions or external integrations required; nothing requested is disproportionate to performing advisory cost reviews.
Instruction Scope
SKILL.md contains staged, procedural guidance (questions to ask, checklists, verification steps). It does not instruct the agent to read system files, access environment variables, call external endpoints, or perform actions outside advisory guidance.
Install Mechanism
No install spec and no code files — the skill is purely a set of runtime instructions, so nothing will be written to disk or pulled from external URLs during install.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for a human/advisory workflow that asks for user-supplied context when needed.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills/config; default autonomous invocation is allowed but the skill itself contains only guidance and asks questions rather than performing privileged actions.
Assessment
This skill is a low-risk, instruction-only workflow for cloud cost reviews and appears coherent with its description. Before using it, avoid pasting secrets or account credentials into chat — provide summaries, anonymized billing figures, or sample data instead. Expect the agent to ask for context (environment, scale, constraints); you should verify any recommended actions (rightsizing, reservations, or changes to infra) in your cloud console and with your ops/security teams before applying them. If you need automated analysis (API calls, billing exports), prefer a dedicated tool or a skill that explicitly declares which credentials it requires and why.Like a lobster shell, security has layers — review code before you run it.
latestvk970xj1rymeseacdd8zzbzcnw183qw0a
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
