Bytesagain Developer

v1.0.0

The essential AI skill stack for developers. Curated from 100,000+ skills across the open SKILL.md ecosystem. Covers daily workflow, debugging, database desi...

0· 48·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The SKILL.md and script both present curated developer skill recommendations and installation hints (e.g., 'clawhub install ...'), which matches the skill's description. Minor inconsistency: the instructions reference a 'clawhub' installer command but the skill declares no required binaries or environment variables — the skill doesn’t state that clawhub must be present.
Instruction Scope
Runtime instructions are purely informational (printing curated lists and links). They do not direct the agent to read system files, access credentials, or send data to third-party endpoints beyond pointing to webpages for browsing. The included script only outputs static text.
Install Mechanism
No install spec is provided (instruction-only). A single helper script is present but is inert text output — there are no downloads, extracts, or package installs embedded in the skill.
Credentials
The skill requests no environment variables, credentials, or config paths. There are no secrets or unrelated credentials required by the skill.
Persistence & Privilege
The skill does not request permanent presence (always is false) and does not attempt to modify other skills or system-wide settings. It can be invoked normally by the agent.
Assessment
This skill is essentially a curated list and a small script that prints recommendations — it does not request credentials or install packages itself. Before using: (1) confirm whether you have or trust the referenced 'clawhub' installer if you plan to run the suggested install commands, (2) review any commands you copy from the output before running them locally, and (3) verify the BytesAgain homepage and author if provenance matters for your environment. There are no signs of secret exfiltration or hidden behavior in the provided files.

Like a lobster shell, security has layers — review code before you run it.

latestvk971vr2bz1hmdqzggkd6d32mdd83wf8n

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments