K8s Prefect Flow Builder

v1.0.0

Build, modify, and review Prefect-based offline orchestration in this repository. Use when adding a new Prefect flow, wrapping an existing offline computatio...

0· 74·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the content of SKILL.md and the included reference docs; all recommendations and required artifacts (prefect.yaml, src/prefect_flows/, CI variables) are coherent with building Prefect flows.
Instruction Scope
Runtime instructions are limited to repository conventions, local files, and Prefect/Kubernetes/CI configuration guidance. There are no commands, external endpoints, or directives to read arbitrary system files or exfiltrate data.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or downloaded during install.
Credentials
The SKILL.md references CI-provided deploy-time values (PREFECT_API_URL, PREFECT_DEPLOY_IMAGE) and Kubernetes runtime env via env_from; no credentials or unrelated environment variables are requested.
Persistence & Privilege
always is false and the skill is user-invocable only. There is no indication it modifies other skills or requires persistent elevated presence.
Assessment
This skill is a repo-centric guide for creating and deploying Prefect v3 flows; it contains patterns and templates but does not request credentials or install software. Before using it: ensure your CI/Kubernetes secrets (PREFECT_API_URL, PREFECT_DEPLOY_IMAGE, and runtime Secrets/ConfigMaps) are managed securely, confirm the target Prefect/Kubernetes versions match the templates, and review any generated prefect.yaml or CI deployment commands before applying them. If you need the skill to perform automated actions (deploy via CI), verify those CI jobs run in a trusted environment — the skill itself does not perform network I/O or secret access.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f5mezdb5ax8ywv3e70cfzw183f9pd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments