Replication Strategy Selector

v1.0.0

Choose a replication topology (single-leader, multi-leader, or leaderless) and configure it correctly — including sync vs. async mode, quorum parameters (w +...

0· 62·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the actions the skill asks the agent to perform: inspect an application codebase or architecture doc and recommend topology, sync mode, quorum values, and conflict resolution. There are no unexpected environment variables, external services, or binaries required that would be disproportionate to a replication-advice skill. The declared dependency on related selector/analyzer skills is plausible.
Instruction Scope
The SKILL.md instructs the agent to gather context from project files, config files, or system requirements documents — exactly the inputs you'd expect for choosing replication strategy. It does not instruct the agent to read unrelated system paths, secrets, or external endpoints. The presence of reference documents included with the skill is consistent with an advisory role.
Install Mechanism
There is no install spec and no code files to run; this is an instruction-only skill. That minimizes the risk of arbitrary code being downloaded or executed by the skill itself.
Credentials
The skill does not request environment variables, credentials, or config paths. The inputs it asks for (codebase, config files, architecture docs) are proportionate to producing replication recommendations.
Persistence & Privilege
always:false (normal). Execution metadata requires tools: Read, Write, Bash. This is coherent because the skill may need to read configs and optionally apply or patch config files, but it does grant the agent the ability to run shell commands and write files in the project directory — a powerful capability that the user should control via run-time permissions and review of proposed changes.
Scan Findings in Context
[regex-scan-none] expected: The regex-based scanner had nothing to analyze because this is an instruction-only skill composed of markdown references. Absence of findings is expected here and does not imply absence of risk at runtime (the agent may still be granted shell/write access).
Assessment
This skill appears coherent and focused on advising/configuring replication. Before installing or running it, consider: (1) it expects access to your project directory and config files — remove or redact any secrets (API keys, DB passwords) from those files or run the skill in a sanitized copy; (2) the execution metadata requests Bash and Write, so the agent could modify files — prefer running it in a branch or sandbox and review any changes before applying them to production; (3) because the skill can inspect config and code, limit its runtime permissions (filesystem scope, network access) to the minimum necessary; (4) if you need the agent to only produce recommendations without editing files, restrict or disable the Write/Bash tools at runtime. Overall the skill is internally consistent with its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

bookforgevk974mfqypx75tp19vqqz5xnk1n84mqy3latestvk974mfqypx75tp19vqqz5xnk1n84mqy3tags:vk974mfqypx75tp19vqqz5xnk1n84mqy3

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📚 Clawdis

Comments