Bridge Pattern Implementor

v1.0.0

Implement the Bridge pattern to decouple an abstraction from its implementation so both can vary independently. Use when you want to avoid a permanent bindin...

0· 89·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the content of SKILL.md: it teaches/applies the Bridge pattern and asks for a codebase input. The declared tools (Read, Write, TodoWrite) and optional Grep/Glob are appropriate for scanning and modifying source code; no unrelated binaries, env vars, or external services are requested.
Instruction Scope
SKILL.md explicitly instructs the agent to inspect the codebase (class hierarchies, platform-specific includes, file names) and to produce design/implementation changes. It does not instruct the agent to read unrelated system files, environment secrets, or transmit data to external endpoints. The scope is consistent with a refactoring/design skill.
Install Mechanism
No install specification or downloads are present — this is instruction-only, so nothing is written to disk by an installer and no external packages are pulled.
Credentials
The skill requests no environment variables, credentials, or config paths. Its required capabilities are limited to reading and writing the codebase (as declared). There are no unexpected credential requests.
Persistence & Privilege
The skill is not forced-always and can be invoked by the user. It requires Write access to modify the codebase (normal for a refactoring assistant) — users should be aware they are granting file-modification capability and should review changes before committing.
Assessment
This skill appears coherent and limited to design and codebase edits. Before using it: run it against a disposable or feature branch, back up your repo, and review all proposed changes/diffs before merging. Don’t grant Write access to a repository containing secrets or production-only configuration you don’t want altered. Because it has no external credentials or downloads, there is low supply-chain risk, but always inspect generated code and test in a safe environment.

Like a lobster shell, security has layers — review code before you run it.

abstractionvk97ch1sa7ez8ajynjakc2033s584kf9gbookforgevk97ch1sa7ez8ajynjakc2033s584kf9gbridgevk97ch1sa7ez8ajynjakc2033s584kf9gcross-platformvk97ch1sa7ez8ajynjakc2033s584kf9gdecouplingvk97ch1sa7ez8ajynjakc2033s584kf9gdesign-patternsvk97ch1sa7ez8ajynjakc2033s584kf9gimplementationvk97ch1sa7ez8ajynjakc2033s584kf9glatestvk97ch1sa7ez8ajynjakc2033s584kf9gstructural-patternvk97ch1sa7ez8ajynjakc2033s584kf9g

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📚 Clawdis

Comments