Edge Computing

v1.0.0

Deep edge computing workflow—what runs at edge vs origin, caching, KV and data locality, security, limits, and latency validation. Use when deploying to CDN/...

0· 81·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill name and description match the SKILL.md content: it provides architecture and rollout guidance for CDN/edge deployments. It does not request unrelated binaries, env vars, or accesses that would be incoherent with an advisory workflow.
Instruction Scope
The instructions are high-level procedural guidance (six stages, checklist, tips). They do not instruct the agent to read system files, access credentials, contact external endpoints, or perform other actions outside advisory scope.
Install Mechanism
No install spec and no code files are present (instruction-only). That minimizes on-disk risk; nothing is downloaded or executed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate request for secrets or unrelated service keys.
Persistence & Privilege
The skill is not marked always:true and does not request persistent system presence or modify other skills. Agent autonomous invocation is allowed by platform default but not escalated by this skill.
Assessment
This skill is a generic, read-only workflow checklist for edge deployments and appears coherent and low-risk. Before installing: verify you trust the (unknown) author if you plan to convert guidance into automated scripts; avoid adding secrets or platform credentials into any automation derived from these instructions; when implementing platform-specific changes, follow official vendor docs and review any code you or an agent generates for network calls or secret use. If you want the agent to act (not just advise), restrict its permissions and review generated code before deployment.

Like a lobster shell, security has layers — review code before you run it.

latestvk9743fkx51vrm7ty0qrqb6ehfh83ks13

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments