Visitor Pattern Implementor

v1.0.0

Implement the Visitor pattern to define new operations on an object structure without changing the classes of the elements it operates on. Use when you have...

0· 63·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and declared dependency (behavioral-pattern-selector) align with a design-pattern guidance skill. There are no unexpected binaries, credentials, or unrelated dependencies.
Instruction Scope
SKILL.md contains developer-facing steps, sample code, and a decision checklist limited to the codebase and pattern selection. It does not instruct reading system secrets, contacting external endpoints, or accessing unrelated system paths. It does request using tools like TodoWrite/Read/Edit which is appropriate for tracking and editing the code.
Install Mechanism
No install spec and no code files to execute; instruction-only is lowest-risk. Nothing is downloaded or written by an installer.
Credentials
The skill requires no environment variables, credentials, or config paths. The only permissions implied are to read and edit the user's codebase (via the listed tools), which is proportionate for a coding guidance skill.
Persistence & Privilege
always is false and the skill does not request persistent system-wide privileges or modifications to other skills. Autonomous invocation is allowed by default but not combined with other high-risk factors.
Assessment
This skill is purely instructional and coherent for implementing the Visitor pattern. Before installing, confirm what the platform 'tools' (TodoWrite, Read, Edit, Grep) will be allowed to access—they typically need read/write access to your repository or workspace to follow the steps. Also follow the advice in the SKILL.md: run the stability test on your element hierarchy first (if element types change frequently, do not apply Visitor). If you have any concerns about tool permissions, restrict them or run the instructions manually in a controlled environment.

Like a lobster shell, security has layers — review code before you run it.

behavioralvk97ec42bzbvnj5eer43617rzw584kd9abookforgevk97ec42bzbvnj5eer43617rzw584kd9adesign-patternsvk97ec42bzbvnj5eer43617rzw584kd9adouble-dispatchvk97ec42bzbvnj5eer43617rzw584kd9agofvk97ec42bzbvnj5eer43617rzw584kd9aiteratorvk97ec42bzbvnj5eer43617rzw584kd9alatestvk97ec42bzbvnj5eer43617rzw584kd9aobject-structurevk97ec42bzbvnj5eer43617rzw584kd9atraversalvk97ec42bzbvnj5eer43617rzw584kd9avisitorvk97ec42bzbvnj5eer43617rzw584kd9a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📚 Clawdis

Comments