Runbooks

v1.0.0

Operational procedures: triggers, steps, verification, rollback. Use when writing ops docs or improving incident speed.

0· 90·0 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (runbooks — operational procedures, triggers, steps, verification, rollback) match the SKILL.md content. The skill requests no binaries, env vars, or config paths — consistent with a purely procedural guidance tool.
Instruction Scope
SKILL.md contains only workflow guidance: ask for context, propose stages, checklist, and quality bar. It does not instruct the agent to read files, access environment variables, call external endpoints, or exfiltrate data. The scope stays within authoring/consulting on runbooks.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be written to disk or downloaded as part of installation (lowest-risk install profile).
Credentials
No required environment variables, credentials, or config paths are declared or referenced in the instructions. Requested access is proportionate (none) to the skill's purpose.
Persistence & Privilege
always is false; the skill is user-invocable and may be invoked autonomously (platform default). There is no indication it modifies other skills or requests persistent system privileges.
Assessment
This skill is low-risk and internally consistent: it only contains procedural guidance for runbooks and does not request credentials, files, or installs. Before using: (1) verify outputs—do not paste secrets or environment-specific credentials into prompts; (2) remember the skill’s source/homepage is unspecified (provenance is limited), so prefer using it for drafting and review rather than executing automated changes; (3) if you enable autonomous invocation for agents, monitor their actions, but autonomous invocation here is the platform default and not, by itself, a problem.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ftxqqhswg7c3yaqkmbkhn9h83hrnw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments