Nextjs App Router

v1.0.0

Deep Next.js App Router workflow—layouts, routing, Server vs Client Components, data fetching and caching, revalidation, streaming, and deployment (Node, ser...

0· 97·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md content: all guidance is about Next.js App Router concepts (layouts, server/client components, caching, revalidation, streaming, deployment). The skill declares no binaries, env vars, or unrelated dependencies.
Instruction Scope
SKILL.md is purely advisory and scoped to six workflow stages; it does not instruct the agent to read arbitrary files, access system credentials, or transmit data to external endpoints. References to webhooks, middleware, or revalidation are domain-appropriate and not actionable requests for secrets.
Install Mechanism
No install specification or code files are present; this is instruction-only so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths. Mentions of hosting (Vercel, edge vs node) are explanatory and do not demand unrelated secrets.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify other skills/configurations; autonomous invocation is allowed by platform default but this skill's content does not raise additional privilege concerns.
Assessment
This skill is a coherent, read-only set of best-practice instructions for Next.js App Router; it's safe from a permissions/credential perspective. Before using advice in production: confirm the Next.js version referenced, test changes in staging (especially edge vs Node runtime differences), and do not paste secrets into chat or webhook examples. If you want automation (scripts or deploy steps), prefer a reviewed tool or code repository rather than copying ad-hoc commands from a conversational skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk970wf5p445efk38jt20t79en583kmp3

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments