frontend-performance-audit

v1.0.0

分析前端页面性能并输出结构化优化报告。适用于页面速度慢、lighthouse 指标差、core web vitals 不达标、首屏慢、交互卡顿、bundle 过大、阻塞渲染资源过多等场景。

0· 173·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (frontend performance audit) match the provided files: metric definitions, diagnosis rules, and a report template. The skill does not request unrelated binaries, credentials, or config paths.
Instruction Scope
SKILL.md restricts actions to reading the included reference files and the user's supplied inputs (URL, Lighthouse report, network waterfall, build artifacts, etc.) and producing a structured report. It does not instruct the agent to read system files, contact hidden endpoints, or exfiltrate data. Note: the skill expects the agent or user to supply measurement data (it does not contain instructions to run Lighthouse or fetch a site), so actual data-gathering behavior depends on how the agent is used.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk or downloaded during install.
Credentials
No environment variables, credentials, or config paths are requested. The skill does not ask for unrelated secrets or access.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify other skills or agent-wide settings.
Assessment
This skill is an offline, instruction-only audit template: it reads the included references and formats an audit from data you provide (URL, Lighthouse report, screenshots, build artifacts). It does not request credentials or install software. Before using it: (1) avoid uploading sensitive secrets or private keys inside project files you provide to the agent, (2) if you expect automated measurement (running Lighthouse, fetching the site) ensure you trust the agent's network access and supply any necessary measurement artifacts yourself, and (3) verify any suggested code changes before applying them. Based on the provided files, there are no incoherent or unexpected requirements.

Like a lobster shell, security has layers — review code before you run it.

latestvk972764pvd03p9hawghn33jex9834zvn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments