Codebase Explorer

v1.0.0

Analyze unfamiliar codebases and generate structured onboarding guides with architecture maps, entry points, conventions, and project-specific instructions....

0· 75·0 current·0 all-time
byDeonte Cooper@djc00p
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (codebase analysis → onboarding guides) match the instructions and included templates. No unexpected credentials, binaries, or config paths are requested that would be unrelated to repository analysis.
Instruction Scope
SKILL.md and references explicitly instruct selective file scanning (manifests, configs, top-two-level directory mapping, targeted grep/glob). That stays within expected scope. Minor gap: there is no guidance about handling or redacting secrets discovered in repo files—recommendation to explicitly redact or flag secrets would improve safety.
Install Mechanism
Instruction-only skill with no install spec and no code files. Lowest-risk delivery: nothing is written to disk by an install step.
Credentials
No environment variables, credentials, or config paths are requested. This is proportional for a read-only codebase analysis skill.
Persistence & Privilege
always is false and the skill does not request persistent system modifications or cross-skill configuration. Normal autonomous invocation is allowed (platform default) and is not combined with other risky requests.
Assessment
This skill appears coherent with its purpose and is low-risk as provided, but remember: it will read repository files when run. Before granting an agent access to private repos, ensure the repo contains no secrets you don't want inspected. Ask the skill-maker to add explicit redaction/secret-detection guidance (e.g., stop and flag files matching *.env, credentials, .aws/ or .git-credentials) and review any generated CLAUDE.md or onboarding guide before sharing externally.

Like a lobster shell, security has layers — review code before you run it.

latestvk9767mekwd3rhf6eqsnkqm2rxh848dwv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🗺️ Clawdis
OSmacOS · Linux · Windows

Comments