Cicd
v1.0.0Pipelines, gates, artifacts, and safe deployments. Use when setting up CI/CD, hardening pipelines, or reducing release risk.
⭐ 0· 67·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (CI/CD pipelines, gates, artifacts, deployments) align with the SKILL.md content: stage-based guidance, checklists, and prompts for context. Nothing requested or required is outside what a CI/CD advisory skill would reasonably need.
Instruction Scope
The SKILL.md contains only procedural guidance and questions to ask users. It does not instruct the agent to read system files, access environment variables, call external endpoints, or transmit data. References to 'secrets' and 'permissions' are advisory (how to design pipelines), not operational steps to fetch credentials.
Install Mechanism
No install spec and no code files — this is instruction-only, the lowest installation risk. Nothing will be written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for a guidance-only CI/CD advisor.
Persistence & Privilege
always is false and there are no instructions to persist state or modify other skills or system settings. Autonomous invocation is permitted by platform default but the skill itself does not request elevated or persistent privileges.
Assessment
This is a coherent, low-risk guidance-only CI/CD helper. Before using it in sensitive contexts: (1) remember it may ask you questions and suggest changes but will not itself access your systems or credentials; (2) never paste secrets, tokens, or private config into chat — instead describe them abstractly; (3) treat its recommendations as advisory and validate any pipeline changes in a safe test environment before applying to production; and (4) note the skill's source is unknown — if you need guarantees or vendor-specific integrations, prefer documented tools or internal experts.Like a lobster shell, security has layers — review code before you run it.
latestvk97ee9t3pspcw6s337bbk0gr1x83pgy0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
