Arquitecto Senior
v1.0.0Design system architecture, evaluate patterns, and produce architecture artifacts. Use when designing a new system or reviewing an existing one, choosing bet...
⭐ 0· 42·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (senior architect) match the included scripts and reference docs. The scripts are for scanning a project, detecting patterns, analyzing dependencies, and generating diagrams — all directly related to the stated purpose. No unrelated credentials, binaries, or install steps are requested.
Instruction Scope
SKILL.md explicitly instructs the agent to run the included Python scripts against a project directory and to load local reference docs — this is within scope. Important runtime detail: the scripts recursively read many files under the supplied project path (rglob, read_text, parse package files). That behavior is expected for this skill, but the agent will read any files present under the provided directory, so users should avoid pointing it at directories containing unrelated sensitive data (home, /, secrets) or confirm the target path before running.
Install Mechanism
There is no install specification; the skill is instruction-plus-scripts only and expects a local Python 3.8+ runtime. No downloads, external package installs, or archive extraction are present in the metadata.
Credentials
The skill requests no environment variables, no credentials, and no config paths. The scripts parse project files (package.json, requirements.txt, go.mod, Cargo.toml) locally to infer dependencies — this is appropriate for a dependency/architecture analyzer.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify other skills. It runs local scripts when invoked and does not change system/agent-wide configuration according to the provided files.
Assessment
This skill appears coherent for architecture analysis, but it runs Python scripts that recursively read files under whatever project path you give it. Before running, point the skill at a project directory that contains only the code you want analyzed (avoid passing root or your home directory). Review the included scripts if you have concerns; they parse package manifests and source files but do not call network endpoints or request credentials. Run in a sandbox or limited-permission environment if you want extra safety.Like a lobster shell, security has layers — review code before you run it.
latestvk9708gqx8w6vh3apkcts0gy7kd83zbk3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
