adversarial-coach

v0.9.0

Adversarial implementation review based on Block's g3 dialectical autocoding research. Use when validating implementation completeness against requirements with fresh objectivity.

1· 1.6k·2 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (adversarial implementation review) align with the SKILL.md instructions: locate requirements, perform independent checks (compilation, tests, edge cases), and return a verdict. The skill requests no unrelated binaries, env vars, or config paths.
Instruction Scope
Instructions tell the agent to look for requirements files, use conversation context, run compilation/tests, and report specific gaps. They do not instruct reading unrelated system files, exfiltrating secrets, or posting results to external endpoints. The guidance is appropriately scoped to code-review tasks.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes disk-write and supply-chain risk.
Credentials
The skill requires no environment variables, credentials, or config paths. The checks it describes (compilation, tests) are proportional to a review task and do not imply access to unrelated services or secrets.
Persistence & Privilege
always is false and the skill does not request persistent system modifications or cross-skill configuration changes. Autonomous invocation is allowed by default but not combined with other high-risk behaviors.
Assessment
This skill is an instruction-only code-review helper and appears internally consistent. Before installing: 1) Be aware the coach will ask to inspect your repository/workspace and may ask you to run builds/tests — grant only the minimal access required. 2) If you plan to let the agent run commands or CI, ensure build environments don't expose secrets (API keys, private tokens). 3) Review any file contents or code the skill outputs before sharing externally. 4) Because the skill can be invoked autonomously by agents, consider who can grant it access to your codebase; revoke access if you see unexpected behavior. Overall, the skill itself does not request credentials or install software and looks safe for use as a review assistant.

Like a lobster shell, security has layers — review code before you run it.

latestvk974z6xhhbc55ejh77m75ae1c980nyv7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments