Edge Computing
v1.0.0Professional career development platform that generates personalized edge computing engineering roadmaps based on individual skills, experience, and career g...
⭐ 0· 51·0 current·0 all-time
byToolWeb@krishnakumarmahadevan-cmd
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the provided artifacts: SKILL.md and openapi.json describe an API for generating personalized edge-computing roadmaps. There are no unexpected binaries, environment variables, or config paths requested that would be unrelated to this purpose.
Instruction Scope
SKILL.md provides request/response examples and endpoint definitions that stay within the roadmap generation domain. One minor ambiguity: the OpenAPI spec does not include a servers/base URL, so the runtime would need a host to actually call; this is an operational omission but not a malicious instruction. The instructions do not ask the agent to read unrelated files, environment variables, or to exfiltrate data to unapproved endpoints.
Install Mechanism
No install spec and no code files beyond documentation/OpenAPI — the skill is instruction-only, so nothing is written to disk or downloaded. This is the lowest-risk install profile.
Credentials
No required environment variables, credentials, or config paths are declared. The payload examples include sessionId and userId fields (normal for personalization), but no secrets are requested.
Persistence & Privilege
Skill is not set to always:true and uses default agent invocation behavior. It does not request persistent system presence, nor modify other skills or system-wide settings.
Assessment
This skill appears coherent and low-risk, but consider these precautions before installing: (1) verify the publisher/source (homepage is missing); (2) ask for the API host and privacy policy — the OpenAPI lacks a servers/base URL; (3) avoid sending sensitive personal data or real session tokens to an unknown service when testing; (4) confirm whether the live API requires authentication and how credentials will be handled; and (5) prefer skills from known authors or with a documented hosting arrangement.Like a lobster shell, security has layers — review code before you run it.
latestvk97fcq4gbakbv20994v09fk97s83s34a
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
