Composite Pattern Implementor
v1.0.0Implement the Composite pattern to compose objects into tree structures representing part-whole hierarchies, letting clients treat individual objects and com...
⭐ 0· 85·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and declared inputs (existing code or a description of a hierarchy) align with the instructions. No unexpected credentials, binaries, or install steps are requested. The dependency on a structural-pattern-selector skill is plausible for selecting which structural pattern to apply.
Instruction Scope
SKILL.md explicitly asks the agent to read and work with existing code (inputs: type=code) and to use tools like Read, TodoWrite, and optionally Edit/Grep. That is appropriate for a refactoring/implementation skill, but it means the agent will access and potentially modify your codebase; users should expect code reading and edits.
Install Mechanism
No install spec and no code files are present. Being instruction-only means nothing is downloaded or written to disk by the skill itself, which is the lowest-risk install profile.
Credentials
The skill declares no environment variables, credentials, or config paths. The only required 'capability' is access to code (via Read/Edit/Grep), which is proportionate to the stated goal of implementing a pattern in a codebase.
Persistence & Privilege
always is false and disable-model-invocation is false (normal). The skill does not request persistent presence or modification of other skills or system-wide settings. It does request the ability to read and edit code via tools, which is expected for its purpose.
Scan Findings in Context
[regex-scan-none] expected: The regex-based scanner found no issues. This is expected because the skill is instruction-only (no executable code) and the scanner had no code to analyze.
Assessment
This skill is coherent for implementing the Composite pattern, but it will read and (if you allow it) modify your codebase via tools like Read and Edit. Before running it: (1) work on a branch or backup your repository, (2) review any edits or patches the agent proposes before applying, (3) confirm what the platform-level tools (TodoWrite, Read, Edit) store or transmit (e.g., logs or external storage), and (4) restrict the agent's workspace or file access scope if you only want it to touch a specific module. If you are uncomfortable with automated edits, use the skill interactively (have it produce suggested code changes) rather than allowing direct edits.Like a lobster shell, security has layers — review code before you run it.
bookforgevk979g80d0bv5hakqygp78rp3cd84kmz9compositevk979g80d0bv5hakqygp78rp3cd84kmz9design-patternsvk979g80d0bv5hakqygp78rp3cd84kmz9gofvk979g80d0bv5hakqygp78rp3cd84kmz9hierarchyvk979g80d0bv5hakqygp78rp3cd84kmz9latestvk979g80d0bv5hakqygp78rp3cd84kmz9recursionvk979g80d0bv5hakqygp78rp3cd84kmz9refactoringvk979g80d0bv5hakqygp78rp3cd84kmz9structuralvk979g80d0bv5hakqygp78rp3cd84kmz9treevk979g80d0bv5hakqygp78rp3cd84kmz9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📚 Clawdis
