Bridge Pattern Implementor
v1.0.0Implement the Bridge pattern to decouple an abstraction from its implementation so both can vary independently. Use when you want to avoid a permanent bindin...
⭐ 0· 89·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name and description match the content of SKILL.md: it teaches/applies the Bridge pattern and asks for a codebase input. The declared tools (Read, Write, TodoWrite) and optional Grep/Glob are appropriate for scanning and modifying source code; no unrelated binaries, env vars, or external services are requested.
Instruction Scope
SKILL.md explicitly instructs the agent to inspect the codebase (class hierarchies, platform-specific includes, file names) and to produce design/implementation changes. It does not instruct the agent to read unrelated system files, environment secrets, or transmit data to external endpoints. The scope is consistent with a refactoring/design skill.
Install Mechanism
No install specification or downloads are present — this is instruction-only, so nothing is written to disk by an installer and no external packages are pulled.
Credentials
The skill requests no environment variables, credentials, or config paths. Its required capabilities are limited to reading and writing the codebase (as declared). There are no unexpected credential requests.
Persistence & Privilege
The skill is not forced-always and can be invoked by the user. It requires Write access to modify the codebase (normal for a refactoring assistant) — users should be aware they are granting file-modification capability and should review changes before committing.
Assessment
This skill appears coherent and limited to design and codebase edits. Before using it: run it against a disposable or feature branch, back up your repo, and review all proposed changes/diffs before merging. Don’t grant Write access to a repository containing secrets or production-only configuration you don’t want altered. Because it has no external credentials or downloads, there is low supply-chain risk, but always inspect generated code and test in a safe environment.Like a lobster shell, security has layers — review code before you run it.
abstractionvk97ch1sa7ez8ajynjakc2033s584kf9gbookforgevk97ch1sa7ez8ajynjakc2033s584kf9gbridgevk97ch1sa7ez8ajynjakc2033s584kf9gcross-platformvk97ch1sa7ez8ajynjakc2033s584kf9gdecouplingvk97ch1sa7ez8ajynjakc2033s584kf9gdesign-patternsvk97ch1sa7ez8ajynjakc2033s584kf9gimplementationvk97ch1sa7ez8ajynjakc2033s584kf9glatestvk97ch1sa7ez8ajynjakc2033s584kf9gstructural-patternvk97ch1sa7ez8ajynjakc2033s584kf9g
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📚 Clawdis
