Design Pattern Selector
v1.0.0Select the right GoF design pattern for a specific object-oriented design problem. Use when facing any of these situations: object creation inflexibility (to...
⭐ 0· 78·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the runtime instructions and reference material: the skill selects GoF patterns, uses classification matrices and diagnostic tables included in its references, and only asks for design problem context or to scan local code for OO-specific symptoms. There are no unexpected dependencies or credentials requested.
Instruction Scope
The SKILL.md instructs the agent to gather problem context and—if a codebase is present—scan it (mentions using Grep/Glob). This is appropriate for the purpose, but it does mean the agent will read repository files when available; confirm you are comfortable with the agent accessing any code you point it at.
Install Mechanism
No install spec or code files beyond documentation; instruction-only skills have minimal install risk (nothing is downloaded or executed).
Credentials
The skill requests no environment variables, credentials, or config paths. The only runtime requirements are agent tools (Read, Write, optional Grep/Glob) that enable local file inspection and note-taking, which are reasonable for a code-analysis/design helper.
Persistence & Privilege
The skill is not always-on and does not request elevated platform privileges. It does require the agent's normal ability to read/write workspace files (TodoWrite/Write) to track steps and produce output, which is expected behavior for an interactive design assistant.
Assessment
This skill appears coherent and low-risk: it only uses included reference docs and (optionally) scans local code for OO patterns and smells. Before invoking it, decide whether you want the agent to read your repository (it will look for 'new', 'extends', 'implements', large switch/if blocks, etc.). Do not put secrets or credentials in the code you ask it to scan; no environment variables or external endpoints are required by the skill. If you want tighter control, provide a sanitized snippet or a high-level problem description instead of granting full repo access.Like a lobster shell, security has layers — review code before you run it.
behavioralvk9753sfbcm2t5wnfby27pfzye584jpsabookforgevk9753sfbcm2t5wnfby27pfzye584jpsacreationalvk9753sfbcm2t5wnfby27pfzye584jpsadesign-patternsvk9753sfbcm2t5wnfby27pfzye584jpsagofvk9753sfbcm2t5wnfby27pfzye584jpsalatestvk9753sfbcm2t5wnfby27pfzye584jpsaobject-orientedvk9753sfbcm2t5wnfby27pfzye584jpsarefactoringvk9753sfbcm2t5wnfby27pfzye584jpsasoftware-designvk9753sfbcm2t5wnfby27pfzye584jpsastructuralvk9753sfbcm2t5wnfby27pfzye584jpsa
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📚 Clawdis
