Golang Samber Hot
v1.0.1In-memory caching in Golang using samber/hot — eviction algorithms (LRU, LFU, TinyLFU, W-TinyLFU, S3FIFO, ARC, TwoQueue, SIEVE, FIFO), TTL, cache loaders, sh...
⭐ 0· 85·0 current·0 all-time
bySamuel Berthe@samber
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md content. The only required binary is 'go', which is appropriate for a Go-focused usage guide and the SKILL.md's 'go get' examples. No unrelated environment variables, binaries, or config paths are requested.
Instruction Scope
SKILL.md contains usage guidance, code snippets, and operational patterns (algorithms, janitor, loaders, sharding, metrics). It does not instruct reading arbitrary files, harvesting env vars, or sending data to unexpected endpoints. It does call out `go get`/GitHub links (expected for fetching the library).
Install Mechanism
This is instruction-only with no install spec. The only install-like instruction is `go get -u github.com/samber/hot`, which is a standard way to fetch a Go module. No downloads from untrusted personal servers, no archives extracted, and nothing written to nonstandard locations by the skill itself.
Credentials
The skill requests no environment variables or credentials. Prometheus examples assume a typical monitoring setup but do not require secrets. The requested permissions and environment access are proportional to the stated purpose.
Persistence & Privilege
Skill flags show no forced always-on presence and it is not user-invocable by default. Being an instruction-only skill, it does not claim to modify other skills or system-wide settings. Allowed-tool permissions (e.g., WebFetch, Bash) are broad but consistent with a coding agent expected to fetch docs and run Go commands.
Assessment
This skill is a documentation-style, instruction-only guide for the samber/hot Go library and appears internally consistent. Before using it or letting an agent execute its steps: 1) verify you actually want the agent to run `go get`/go commands (they will fetch code from the network); 2) prefer pinning a module version (e.g., use a specific tag or module version) rather than `go get -u` to avoid pulling unexpected updates; 3) review the upstream repository (https://github.com/samber/hot) yourself for trustworthiness and license compatibility (MIT is stated); 4) if you enable autonomous agent invocation, remember the agent could perform network operations (fetching repos, running go build/tests) — restrict that capability if you are not comfortable. Overall the skill is coherent for its purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk97fq59me8nck8kxy339mtbmjs83pzk3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔥 Clawdis
Binsgo
