Mapbox Cartography
v1.0.0Expert guidance on map design principles, color theory, visual hierarchy, typography, and cartographic best practices for creating effective and beautiful ma...
⭐ 0· 43·0 current·0 all-time
by@mapbox
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the included files and SKILL.md: cartographic guidance, color palettes, typography, layer ordering, and zoom strategies. The skill declares no binaries, env vars, or config paths — which is appropriate for a documentation-style cartography skill. (Registry metadata lacks a homepage, but that does not create a capability mismatch.)
Instruction Scope
SKILL.md and other files contain only map-design recommendations, code snippets for style JSON/expressions, testing checklists, and scenario advice. There are no instructions to read system files, access environment variables, call external endpoints, or transmit user data.
Install Mechanism
No install spec and no code files are present beyond static documentation — lowest-risk model (instruction-only). Nothing will be written to disk or downloaded by an installer.
Credentials
The skill requires no environment variables, credentials, or config paths. That is proportionate for static cartographic guidance and avoids unnecessary access to secrets or external services.
Persistence & Privilege
always:false and default autonomous invocation are set (normal). The skill does not request persistent system privileges, modify other skills, or access other skills' credentials.
Assessment
This skill is documentation-only and appears internally consistent with its map-design purpose. It does not request credentials or install code, so it cannot exfiltrate secrets or modify your system. Before relying on it in production: verify the author/source (no homepage is listed), confirm Mapbox license/branding requirements for any derived styles, and test the suggested palettes and layer orders with your real data and accessibility tools. If you need stronger assurance, ask the publisher for contact info or a changelog/history to confirm maintenance and provenance.Like a lobster shell, security has layers — review code before you run it.
latestvk97ex2qs1mqrh8d9dqqwwke2tx83w19q
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
