Debug Pro

v1.0.0

Provides a 7-step debugging protocol plus language-specific commands to systematically identify, verify, and fix software bugs across multiple environments.

39· 16.3k·166 current·176 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and (implicit) purpose — systematic debugging help and language-specific commands — match the SKILL.md content. There are no unrelated environment variables, binaries, or installs requested.
Instruction Scope
The instructions include system-level diagnostic commands (lsof, netstat, ps, top, df, etc.) and git bisect which will inspect or temporarily change repository state; this is coherent for a debugging guide but these commands can reveal process, network, and filesystem information. The SKILL.md does not instruct reading unrelated user files or environment variables beyond what these commands expose.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk by the skill package itself.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate to its stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent or privileged installation. It does not modify other skills or system-wide agent settings.
Assessment
This skill is a coherent debugging reference and does not request credentials or install code. Things to consider before installing: the commands it recommends (ps, lsof, netstat, top, df, curl, dig, git bisect, etc.) access and may display sensitive process, connection, or filesystem information — avoid running them on systems containing secrets or data you don't want exposed. git bisect will check out intermediate commits (use git bisect reset afterwards). Because the skill is instruction-only, the main risk is what the agent or operator chooses to run interactively or autonomously; ensure you trust the agent's permissions and review any commands it proposes before execution.

Like a lobster shell, security has layers — review code before you run it.

latestvk976ap1z6fr6vhmrh59mprr4n9802pvk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments