Rate Limit Pro

v1.0.0

Advanced rate limiting with tiered controls and quota management

0· 688·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the content: SKILL.md provides a straightforward JavaScript in-memory RateLimiter with tiered quotas. There are no unrelated environment variables, binaries, or config paths requested.
Instruction Scope
All runtime instructions are limited to a RateLimiter class implemented in JS and example usage; they do not read files, call external endpoints, or access environment secrets. Note: the SKILL.md contains code and a module.exports line, but there are no actual code files or an install step—so the platform will not automatically install or execute this code unless you (or the platform) copy it into a runtime environment.
Install Mechanism
No install spec is provided (instruction-only). This is lower risk because nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. That aligns with an in-memory utility that does not require external services.
Persistence & Privilege
The skill does not request permanent presence, system privileges, or modifications to other skills/configuration. always is false and autonomous invocation is allowed by default (normal).
Assessment
This skill appears to be a simple, self-contained in-memory rate limiter and is internally consistent. Important considerations before using: (1) SKILL.md contains JS code but there are no code files or install steps — the code will not magically run on your agent; you must copy/integrate it into your application runtime. (2) The limiter is in-memory only: it does not persist state across restarts and is not suitable for distributed systems without adding a shared store (Redis, DB) and synchronization. (3) For high-scale or multi-process deployments, add persistence, eviction, and memory safeguards to avoid unbounded Map growth. (4) Because it requests no secrets or network access, credential exfiltration risk from this skill is low. If you plan to use this in production, review and adapt the implementation (persistence, concurrency, memory limits, and security) before deployment.

Like a lobster shell, security has layers — review code before you run it.

latestvk978ddvy6n4766pts41ktbvnjx81gcxp

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments