Agent Orchestration Multi Agent Optimize

v1.0.0

Optimize multi-agent systems with coordinated profiling, workload distribution, and cost-aware orchestration. Use when improving agent performance, throughput, or reliability.

1· 1.9k·13 current·15 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (multi-agent optimization) matches the SKILL.md content: profiling, orchestration, cost and latency strategies, and example pseudocode. There are no unrelated requirements (no external credentials, binaries, or unexpected config paths).
Instruction Scope
SKILL.md contains high-level guidance and illustrative Python snippets for profiling, orchestration, cost tracking, and monitoring. It does not instruct the agent to read arbitrary system files, access unrelated environment variables, call external endpoints, or exfiltrate data. Instructions are scoped to performance optimization tasks.
Install Mechanism
No install spec and no code files — lowest-risk, instruction-only skill. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. The few referenced models and budgets in examples are illustrative and do not require secrets. No disproportionate access is requested.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or ask to modify other skills or system-wide settings. Autonomous invocation (default) is not by itself concerning and is appropriate here.
Assessment
This skill is a conceptual guide and illustrative snippets — it does not perform actions or request credentials. Before using it in production: (1) implement and review any concrete code carefully (the examples are incomplete), (2) run changes in staging with regression tests and rollback plans as the skill itself recommends, (3) avoid pasting secrets into any prompts derived from the skill, and (4) validate any model/service names and cost estimates against your actual providers and billing settings.

Like a lobster shell, security has layers — review code before you run it.

latestvk976e9tz3bjdqkddmb4k2p4qcn80tx8m

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments