AI Agent Stack Builder

v1.0.0

Intelligent recommendation system that generates optimal AI agent technology stacks based on project requirements, constraints, and team expertise.

0· 70·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, SKILL.md content, and openapi.json all describe a stack-recommendation API and require no unrelated binaries, credentials, or system access — the requested surface is proportional to the stated purpose.
Instruction Scope
SKILL.md defines request/response schemas and endpoints for generating recommendations and does not instruct the agent to read files, environment variables, or system state. Note: formData accepts fields like userId and additionalNotes which could contain sensitive information; the skill does not explain where requests are sent (no base URL), so be cautious about providing sensitive data when invoking.
Install Mechanism
No install spec and no code files that would be written to disk; instruction-only skills are lowest-risk from an install perspective.
Credentials
The skill declares no required environment variables, credentials, or config paths. No disproportionate credential access is requested.
Persistence & Privilege
always is false (default), and there is no indication the skill modifies agent/system configurations or requests persistent presence or elevated privileges.
Assessment
This skill appears coherent and self-contained: it documents a recommendation API and does not request credentials or install code. However, the source and homepage are unknown — before using it, confirm where the API requests will be sent (there's no base URL), avoid sending sensitive or regulated data (e.g., PII, secrets, health records) in formData, and test with non-sensitive sample inputs first. If you plan to use this in production, prefer skills from a known source or review the origin and hosting details so you can verify privacy and security guarantees.

Like a lobster shell, security has layers — review code before you run it.

latestvk975hnc8vv0ekc188bq1w1rcsd843ees

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments