JavaScript

v1.0.3

Write robust JavaScript with async patterns, type coercion handling, and modern ES2023+ features.

5· 2.4k·19 current·19 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description promise JavaScript guidance; the SKILL.md and the four topic files provide exactly that (async patterns, coercion, collection methods, modern ES features). There are no unrelated requirements (no env vars, no binaries, no install).
Instruction Scope
SKILL.md and the included docs are purely advisory reference material for writing JS. They do not instruct the agent to read system files, call external endpoints, access credentials, or perform actions outside of producing guidance or code examples.
Install Mechanism
No install spec and no code files — nothing is written to disk or downloaded. This is the lowest-risk form (instruction-only).
Credentials
The skill declares no environment variables, credentials, or config paths. Nothing requested is disproportionate to providing language guidance.
Persistence & Privilege
always:false and default autonomous invocation are appropriate for a user-invocable knowledge skill. The skill does not request persistent system privileges or modify other skills' configs.
Assessment
This skill is a documentation-only helper for JavaScript: it doesn't install software or ask for credentials, and its content matches its description. You can install it without exposing secrets or adding software. As with any coding advice, review generated code and test it in your environment — the docs may contain minor language mixing (some Spanish fragments) and the guidance can suggest patterns that still need adaptation to your project (e.g., error handling, performance). If you need the agent to execute code or access your repo, only grant those capabilities intentionally and separately.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b7myb4mpzvctgg3esp3km518153t0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments