pua-debugging-pro
v1.0.0Professional anti-giveup debugging protocol for coding tasks where the agent starts looping, deflecting to users, or trying to end early without evidence. Us...
⭐ 1· 632·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (anti-giveup debugging) match the SKILL.md content and the included checklist/postmortem templates. There are no unexpected environment variables, binaries, or third-party services required.
Instruction Scope
Instructions appropriately direct the agent to capture errors, read relevant source/config context, run validations, and perform external doc lookups. This naturally requires the agent to access project files, logs, and run commands; that access is coherent with debugging but could expose sensitive local data if the agent has broad filesystem or network permissions. The skill does not instruct exfiltration or use of unknown endpoints.
Install Mechanism
Instruction-only skill with no install spec and no code files to execute. Low risk from install mechanism (nothing is written to disk by the skill itself).
Credentials
No environment variables, credentials, or config paths are requested. The SKILL.md's recommended actions (reading code/logs, checking runtime prerequisites) explain why local access may be needed; those needs are proportionate to the debugging purpose.
Persistence & Privilege
Skill is not always:true and does not request persistent system-wide changes. It is user-invocable and can be invoked autonomously by the agent (platform default) but that is appropriate for a debugging protocol.
Assessment
This skill appears coherent and low-risk: it is a protocol and templates to make debugging more evidence-driven. Before installing, confirm that the agent will only be granted the minimal project-level file/log access needed (avoid broad filesystem or secret access). Review the included THIRD_PARTY_NOTICES if you must comply with upstream licensing. If you are concerned about autonomous agent actions, restrict the agent's runtime permissions (filesystem, network, secrets) or require explicit user confirmation before the agent reads sensitive files or runs commands.Like a lobster shell, security has layers — review code before you run it.
latestvk973ygqkrad6nybq5fk5y01mc182j3sr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
