Agent Orchestration Multi Agent Optimize.Skip

v1.0.0

Optimize multi-agent systems with coordinated profiling, workload distribution, and cost-aware orchestration. Use when improving agent performance, throughpu...

1· 68·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description, SKILL.md content, and provided examples all focus on multi-agent profiling, orchestration, cost and latency optimization; nothing in the package requests unrelated capabilities (no env vars, binaries, or install steps).
Instruction Scope
SKILL.md contains high-level guidance and code examples for profiling and orchestration; it does not instruct the agent to read arbitrary host files, access credentials, contact unknown external endpoints, or perform privileged actions. The examples are illustrative rather than operational commands to execute on the host.
Install Mechanism
No install spec and no code files to execute are present, so nothing is written to disk or fetched at install time.
Credentials
The skill declares no required environment variables, credentials, or config paths, which is proportionate for an instruction-only optimization guide.
Persistence & Privilege
The skill does not request always:true and is user-invocable only; it has no mechanism to persistently modify agent settings or other skills.
Assessment
This skill appears to be a benign, instruction-only guide for multi-agent optimization. However, note that the package has no homepage or clear source and the metadata shows a small ownerId mismatch — if provenance matters for you, verify the publisher before trusting it in production. Because the SKILL.md contains code examples (Python snippets), do not copy-and-run them on a production system without reviewing them first; treat changes to orchestration as risky and test them in a staging environment with rollbacks and monitoring in place.

Like a lobster shell, security has layers — review code before you run it.

latestvk978s5ethk5nq3qnrtsgbygrah83s238

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments