Async Agent Commerce: Event-Driven Patterns for Autonomous Transactions
v1.3.1Async Agent Commerce: Event-Driven Patterns for Autonomous Transactions. Build event-driven agent commerce systems using saga patterns, compensating transact...
⭐ 0· 76·0 current·0 all-time
by@mirni
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name and description promise an educational guide about async event-driven patterns for agent commerce; the SKILL.md is exactly that (tutorial text and Python examples using the GreenHelix sandbox). There are no unrelated requirements (no cloud creds, no weird binaries) that would contradict the stated purpose.
Instruction Scope
The runtime instructions are purely guide content and code examples. The file explicitly states it does not execute code, require credentials, or install dependencies. Examples call the GreenHelix sandbox endpoint (an external service) which matches the guide's scope. There are no instructions to read system files, environment variables, or other sensitive local state.
Install Mechanism
There is no install spec and no code files to write or execute; this is the lowest-risk form (instruction-only).
Credentials
The skill declares no required environment variables, credentials, or config paths. The content references a sandbox service that claims no API key is required; nothing in the guide asks for unrelated secrets or credentials.
Persistence & Privilege
The skill is not always-enabled, does not request persistent system presence, and does not modify agent/system configurations. Autonomous invocation is allowed by default but is normal for skills; nothing else increases privilege.
Assessment
This guide appears internally consistent and educational, but exercise normal precautions before running its code examples: (1) verify you trust the external sandbox endpoint (sandbox.greenhelix.net) and its terms, (2) run examples in an isolated environment (container or VM) rather than your primary system, (3) never paste production credentials into tutorial code — the sandbox may not require keys, but production APIs will, and (4) review any network calls the examples make before allowing autonomous agents to execute them so you understand what external endpoints will receive your data or requests.Like a lobster shell, security has layers — review code before you run it.
agent-commercevk97cmbk0hdnc8a4z3h77b5cxf584xt54ai-agentvk97cmbk0hdnc8a4z3h77b5cxf584xt54asyncvk97cmbk0hdnc8a4z3h77b5cxf584xt54event-drivenvk97cmbk0hdnc8a4z3h77b5cxf584xt54greenhelixvk97cmbk0hdnc8a4z3h77b5cxf584xt54guidevk97cmbk0hdnc8a4z3h77b5cxf584xt54latestvk97cmbk0hdnc8a4z3h77b5cxf584xt54openclawvk97cmbk0hdnc8a4z3h77b5cxf584xt54sagavk97cmbk0hdnc8a4z3h77b5cxf584xt54
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
