Observability Slos

v1.0.0

Deep SLO/SLI workflow—user-centric SLIs, SLO targets and windows, error budgets, multi-window burn alerts, and policy when budget is exhausted. Use when defi...

0· 98·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the SKILL.md: it provides a 6-stage SLO/SLI workflow. There are no unrelated required binaries, env vars, or config paths that don't belong to this purpose.
Instruction Scope
Runtime instructions are procedural guidance (pick journeys, define SLIs, set targets, alerting policy, etc.). They do not instruct the agent to read system files, access environment variables, install software, or transmit data to unexpected endpoints. The only external action implied is to 'confirm metric stack and dependency SLOs from vendors', which is reasonable for the workflow and not prescriptive about credentials or endpoints.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. It does not request access to unrelated services.
Persistence & Privilege
always:false and default invocation settings. The skill does not request permanent presence or configuration changes to other skills; it does not require elevated platform privileges.
Assessment
This skill appears low-risk and coherent — it's a playbook for SLO work rather than code that touches your systems. Before installing or allowing an agent to act on it, ensure you do not grant the agent unrestricted access to your monitoring/production credentials: if the agent will query metrics or vendor APIs, provide scoped, read-only keys or a staging dataset. Also review any automated actions (alerts, runbook triggers) you plan to wire up so they don't page production unexpectedly.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fj583cwp39qpg7asb205jyh83jepb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments