Mapbox Android Patterns
v1.0.0Official integration patterns for Mapbox Maps SDK on Android. Covers installation, adding markers, user location, custom data, styles, camera control, and fe...
⭐ 0· 72·0 current·0 all-time
by@mapbox
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the provided SKILL.md and reference files: all content is Android + Mapbox SDK v11 integration patterns (installation, annotations, location, styles, camera, interactions). There are no unrelated required binaries, env vars, or config paths.
Instruction Scope
SKILL.md and reference docs only instruct typical developer actions: add the Mapbox Maven repo, add dependencies, place an access token in app resources, request location permissions, and use Mapbox APIs. No instructions ask the agent to read arbitrary host files, export secrets, or contact endpoints other than Mapbox official docs and Mapbox's Maven URL.
Install Mechanism
This is instruction-only with no install spec and no code to execute or download; nothing is written to disk by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. The only secret referenced is the Mapbox access token, and its suggested placement in app/res/values is consistent with the SDK usage described.
Persistence & Privilege
always is false and there are no install-time persistence actions. The skill does not request elevated platform privileges or attempt to modify other skills or system-wide settings.
Assessment
This appears to be a straightforward, coherent documentation-style skill for Mapbox Android integration. Before using the patterns in a real app: avoid committing your Mapbox access token to public repos (consider build-time secrets or Android Secret Manager), verify the dependency version (11.18.1 in the docs) and the Mapbox Maven URL are the intended official endpoints, and review location-permission handling to meet user-privacy requirements.Like a lobster shell, security has layers — review code before you run it.
latestvk972ektgwv9qyn3kybvxx5wv4d83wnzr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
