Abstract Factory Implementor

v1.0.0

Implement the Abstract Factory pattern to create families of related objects without specifying their concrete classes. Use when a system must be independent...

0· 89·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (implement Abstract Factory) aligns with the instructions: mapping product families, defining interfaces, and refactoring a codebase. No unrelated environment variables, binaries, or installs are requested.
Instruction Scope
SKILL.md directs the agent to examine and refactor a codebase (use TodoWrite, Read, optional Grep/Edit). These actions are appropriate for a code-refactoring helper and do not reference unrelated system files, secrets, or external endpoints.
Install Mechanism
There is no install specification and no code files — the skill is instruction-only, so nothing is downloaded or written by an installer. This is low-risk and proportional to the purpose.
Credentials
The skill declares no required environment variables, credentials, or config paths. The tools it lists (TodoWrite, Read, optional Grep/Edit) are consistent with analyzing and modifying source code.
Persistence & Privilege
The skill does not request always:true or other elevated persistence. It is user-invocable and can be invoked autonomously (platform default), which is appropriate for a helper skill.
Assessment
This skill is an instruction-only refactoring assistant for the Abstract Factory design pattern and appears internally consistent. Before installing, note that it expects permission to read and (optionally) edit your codebase via the listed tools — review the SKILL.md to confirm you’re comfortable granting those tool-level accesses. Also verify the homepage/source (provided) if provenance matters to you; the bundle itself requests no credentials and performs no installs.

Like a lobster shell, security has layers — review code before you run it.

abstract-factoryvk972ddrg8asxsdczxktgcx7vws84kkyrbookforgevk972ddrg8asxsdczxktgcx7vws84kkyrcreationalvk972ddrg8asxsdczxktgcx7vws84kkyrdesign-patternsvk972ddrg8asxsdczxktgcx7vws84kkyrgofvk972ddrg8asxsdczxktgcx7vws84kkyrlatestvk972ddrg8asxsdczxktgcx7vws84kkyrportabilityvk972ddrg8asxsdczxktgcx7vws84kkyrproduct-familiesvk972ddrg8asxsdczxktgcx7vws84kkyrrefactoringvk972ddrg8asxsdczxktgcx7vws84kkyr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📚 Clawdis

Comments