Breadboarding — Affordance Wiring for UI and Code
v1.0.1Transform a workflow description into affordance tables showing UI and Code affordances with their wiring. Use to map existing systems or design new ones fro...
⭐ 0· 74·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (breadboarding affordances) match the SKILL.md: it expects workflow descriptions and/or code repos and produces UI/Code affordance tables and optional diagrams. It does not request unrelated binaries, credentials, or system access.
Instruction Scope
The SKILL.md expects the agent to analyze workflows and, in the 'mapping existing system' use case, code repositories. That is consistent with the purpose, but it implies the agent will ask for or consume repository contents and workflow descriptions — users should avoid sharing secrets or broad repository access unless intended.
Install Mechanism
No install spec and no code files (instruction-only). This is low-risk: nothing will be written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no disproportionate secret or environment access requests.
Persistence & Privilege
always is false and the skill does not request persistent system privileges or modifications. Model invocation is enabled (the platform default) but that is expected for an interactive instruction-only skill and not flagged here.
Assessment
This skill appears coherent and low-risk, but it will ask for workflow descriptions and (optionally) repository contents to produce its affordance tables. Only share the minimum code or repo slices needed for the task, avoid pasting secrets, tokens, or full private keys, and prefer sanitized examples when possible. Because it is instruction-only, it won't install software, but confirm any agent-level repo access or file reads before granting them.Like a lobster shell, security has layers — review code before you run it.
latestvk978qmk11fjay420rpds43q0kn8418a0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
