Golang Spf13 Cobra
Analysis
This is an instruction-only Go/Cobra coding guide with purpose-aligned tools and examples, with only normal caution around running Go/Git commands and installing latest-version packages.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
allowed-tools: Read Edit Write Glob Grep Bash(go:*) Bash(golangci-lint:*) Bash(git:*) Agent WebFetch mcp__context7__resolve-library-id mcp__context7__query-docs
The skill grants code editing plus local Go/Git command capabilities. This is expected for a Go CLI engineering skill, but these tools can change source files, dependencies, tests, or repository state.
go get github.com/spf13/cobra@latest
The setup guidance uses an @latest module version. This is common and purpose-aligned for adding Cobra, but it resolves dynamically and is less reproducible than a pinned version.
