Angular
v1.0.1Avoid common Angular mistakes — subscription leaks, change detection, dependency injection, and module organization.
⭐ 3· 1.3k·8 current·8 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (Angular best practices) align with the provided files: components.md, rxjs.md, di.md, forms.md, http.md, routing.md and an overview SKILL.md. There are no unrelated environment variables, binaries, or install steps requested.
Instruction Scope
SKILL.md and the included Markdown files contain only guidance about Angular pitfalls and patterns. They do not instruct the agent to read local system files, access credentials, send data to external endpoints, or run arbitrary commands. They stay within the stated purpose.
Install Mechanism
No install spec and no code files are included. Because this is instruction-only, nothing is written to disk or downloaded during install — minimal install risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no requests for unrelated secrets or broad permissions that would be disproportionate to an Angular guidance skill.
Persistence & Privilege
Flags are default (always: false, user-invocable: true, agent invocation allowed). The skill does not request permanent presence or modify other skills/configurations. Autonomous invocation is allowed by default but is not combined with other red flags here.
Assessment
This skill is just static guidance (Markdown) about Angular best practices and does not request credentials or install code — that makes it low-risk and consistent with its description. Before sharing, remember: an agent using this skill might ask you to paste project code or configs to give concrete advice; only share code you are comfortable exposing. If you plan to allow the agent autonomous access to your repositories or environment later, consider limiting that access and reviewing any proposed commands before execution.Like a lobster shell, security has layers — review code before you run it.
latestvk97dg25krtvy8nf1dt5nd1wrmh8151jf
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
