Tracing
v1.0.0Deep distributed tracing workflow—instrumentation boundaries, context propagation, sampling, tail-based analysis, service maps, and using traces for latency...
⭐ 0· 80·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (deep distributed tracing) match the SKILL.md content: a six-stage workflow for instrumentation, propagation, sampling, analysis, and governance. Nothing in the metadata or instructions requests unrelated capabilities (no cloud creds, no platform-specific secrets).
Instruction Scope
SKILL.md contains advisory guidance, questions to ask, and checklists for implementing tracing. It does not instruct the agent to read local files, environment variables, or send data to external endpoints, nor does it ask for credentials or system access. Instructions are narrowly scoped to tracing practices.
Install Mechanism
No install spec or code files — instruction-only. That minimizes disk writes and execution risk. No downloads or package installs are referenced.
Credentials
Requires no environment variables, credentials, or config paths. The guidance mentions common tracing systems (Jaeger, X-Ray, OpenTelemetry) but does not require tokens or keys for any vendor — proportional to an advisory skill.
Persistence & Privilege
Skill is not always-enabled and is user-invocable. It does not request persistent presence or attempt to modify other skills or agent-wide settings. Autonomous invocation is allowed by platform default but not combined with other concerning privileges.
Assessment
This skill is a text-only workflow for designing and operating distributed tracing; it does not request credentials or install code. Before using: ensure the recommendations align with your org's privacy and compliance requirements (PII redaction, retention policies), and map the guidance to the specific telemetry vendors and libraries you run. If you want the agent to act autonomously with this skill, be aware the platform allows autonomous invocation by default — that’s normal for skills but you should only enable it if you trust automated recommendations in your environment.Like a lobster shell, security has layers — review code before you run it.
latestvk97bxrngp788bxj1fbg3prn8f983g5hv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
