Oltp Olap Workload Classifier

v1.0.0

Classify a data workload as OLTP, OLAP, or hybrid, then recommend the appropriate database architecture — transactional database, dedicated data warehouse, o...

0· 14·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (classifying workloads and recommending architectures) matches the SKILL.md content. Requested inputs (query patterns, who runs queries, write patterns, schema, SQL files, infra config) are appropriate and necessary for this task. There are no unrelated credentials, binaries, or install steps that would be disproportionate to the stated purpose.
Instruction Scope
Runtime instructions describe collecting structured answers from the user and optionally scanning the codebase for schema/.sql files and infra config (Redshift/BigQuery/Snowflake, dbt, Airflow). Those file and query scans are directly relevant to classifying workloads. The skill does not instruct exfiltration to third-party endpoints or access to unrelated system secrets. It does request use of agent file tools (Read, Grep, Glob), which is reasonable for the stated goal.
Install Mechanism
No install spec or code files — this is instruction-only. No downloads, package installs, or archive extraction are present. That minimizes surface area for arbitrary code execution.
Credentials
The skill requires no environment variables, credentials, or config paths. The only environment interaction described is scanning repository files and SQL/schema artifacts, which is proportional to its function. There are no requests for unrelated secrets or cloud credentials.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request persistent privileges or to modify other skills or system-wide agent settings. It indicates it needs Read/Write tools to scan files, which is normal for repository inspection but worth controlling at the agent/platform level.
Assessment
This skill appears coherent and low-risk: it asks for query examples, schema or .sql files, and optionally scans your codebase for query patterns and infra config to make classification recommendations. It does not request credentials or install software. Before using it, consider: (1) provide sanitized query examples or schema (remove customer PII or production secrets) rather than raw production dumps; (2) grant the agent file-read (Read/Grep/Glob) access only to the repository paths you want it to analyze; (3) avoid pasting full database connection strings or credentials into prompts; and (4) if you need the agent to inspect CI/config files, review those files for embedded secrets and redact them first. If you want higher assurance, request a copy of the full SKILL.md from the publisher or run the skill on a staging copy of your schema/data.

Like a lobster shell, security has layers — review code before you run it.

analyticsvk97a68xc8hs9xfgbd88nyfn76n84m1b8bookforgevk97a68xc8hs9xfgbd88nyfn76n84m1b8column-storagevk97a68xc8hs9xfgbd88nyfn76n84m1b8data-architecturevk97a68xc8hs9xfgbd88nyfn76n84m1b8data-warehousevk97a68xc8hs9xfgbd88nyfn76n84m1b8database-selectionvk97a68xc8hs9xfgbd88nyfn76n84m1b8etlvk97a68xc8hs9xfgbd88nyfn76n84m1b8latestvk97a68xc8hs9xfgbd88nyfn76n84m1b8olapvk97a68xc8hs9xfgbd88nyfn76n84m1b8oltpvk97a68xc8hs9xfgbd88nyfn76n84m1b8star-schemavk97a68xc8hs9xfgbd88nyfn76n84m1b8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📚 Clawdis

Comments