Alerting

v1.0.0

Alert design: SLOs, noise reduction, routing, severity. Use when tuning pages or defining on-call policy.

0· 84·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and the SKILL.md all describe the same purpose: a staged, procedural guide for alerting work (SLOs, routing, severity, noise reduction). There are no unrelated requirements (no env vars, binaries, or installs) that would contradict the stated purpose.
Instruction Scope
The instructions are purely procedural: ask context questions, propose stages, provide checklists and verification steps. They do not instruct the agent to read files, access environment variables, call external endpoints, or exfiltrate data. Scope remains focused on advising the user.
Install Mechanism
No install spec and no code files — this is instruction-only, which is the lowest-risk installation model and appropriate for a guidance-style skill.
Credentials
The skill requires no environment variables, credentials, or config paths. That is proportionate for a conversational guidance skill and matches its stated function.
Persistence & Privilege
Flags show default behavior (always: false, user-invocable: true, model invocation allowed). The skill does not request persistent presence, nor does it appear to modify system or other-skill settings.
Assessment
This skill is a benign, high-level advisor for alerting design. It's safe in that it doesn't request credentials, install code, or access files. Before sharing, remember: the agent may ask you for context (logs, configs, or incident details) — avoid pasting sensitive credentials or private data. If you want the agent to act on live systems (apply configs, call APIs), prefer a skill that explicitly requests the needed credentials and review those requirements carefully. Otherwise, using this skill for planning, checklists, and review guidance is appropriate.

Like a lobster shell, security has layers — review code before you run it.

latestvk979aez0qkm2fsx3k3qzvwa7bs83q4py

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments