architecture designer

v1.0.0

Use when designing new system architecture, reviewing existing designs, or making architectural decisions. Invoke for system design, architecture review, des...

0· 48·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Requires OAuth token
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and included reference documents (ADR template, architecture patterns, system-design template, NFR checklist, DB guidance) align with an architecture/design skill; there are no unrelated binaries, env vars, or external credentials requested.
Instruction Scope
SKILL.md contains role-definitions, workflows, templates and references and does not instruct the agent to run shell commands, read arbitrary system files, access environment variables, or transmit data to external endpoints beyond referencing its own docs. The only external URL in the file is a human-facing 'Complete setup guide' link; it is not an instruction to send data there.
Install Mechanism
No install spec and no code files — this is instruction-only documentation. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The guidance references common cloud technologies conceptually but does not request access to any secrets or unrelated services.
Persistence & Privilege
Skill is not forced-always, does not request elevated platform privileges, and does not modify other skills or system-wide settings. Default autonomous invocation flags are unchanged (normal).
Assessment
This skill is a documentation/template pack for system architecture and appears internally consistent. Before installing consider: (1) this is guidance only — validate any recommended technologies and cost/security implications against your organization, (2) the SKILL.md links to an external setup guide (human-facing); avoid pasting secrets into external sites, and (3) because it is instruction-only it cannot itself execute code or exfiltrate data, but the agent using the skill might propose actions that touch cloud providers — review any follow-up steps (CLI commands, credential usage) before you run them. If you want extra assurance, review the SKILL.md and reference files yourself for policy or compliance concerns.

Like a lobster shell, security has layers — review code before you run it.

latestvk975z9zdec04drwwkcx6htxa4584s8jg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments