TensorFlow
v1.0.0Avoid common TensorFlow mistakes — tf.function retracing, GPU memory, data pipeline bottlenecks, and gradient traps.
⭐ 2· 1k·6 current·6 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the SKILL.md content. The only required binary is python3, which is reasonable for TensorFlow guidance; there are no unrelated env vars, binaries, or config paths requested.
Instruction Scope
SKILL.md contains best-practice notes and code snippets (tf.function, GPU memory settings, tf.data, gradients, saving). It does not instruct reading user files, secrets, or sending data to external endpoints. It mentions CUDA_VISIBLE_DEVICES as a common testing env var but does not attempt to read or exfiltrate secrets.
Install Mechanism
No install spec or code files are present; this is instruction-only, so nothing is downloaded or written to disk by the skill itself (lowest install risk).
Credentials
The skill declares no required environment variables or credentials. It references a common runtime env var (CUDA_VISIBLE_DEVICES) in examples but does not require or request any secrets or unrelated credentials.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent presence or system-wide configuration changes. disable-model-invocation is false (normal platform default).
Assessment
This skill is instruction-only (no downloads or code) and provides TensorFlow debugging tips — low risk. Note source/homepage are not provided, so you can't verify the author; that matters more for code that would be installed. Before following commands: ensure you run them in a controlled environment where you have permission (e.g., your development VM or container), verify TensorFlow version compatibility, and cross-check the snippets with official TensorFlow docs. Do not provide any credentials to this skill (none are requested). If you want even lower risk, manually copy the relevant advice rather than allowing an agent to act autonomously on your environment.Like a lobster shell, security has layers — review code before you run it.
latestvk97ex1cc2kdbtvjh7a14f7n6gd80wye2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧠 Clawdis
OSLinux · macOS · Windows
Binspython3
