Code Architect

v0.1.0

Design minimal implementation plans aligned with the existing codebase, including architecture, task breakdown, risk analysis, and migration steps before cod...

0· 60·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the SKILL.md: the skill's purpose is to produce minimal implementation plans that fit an existing codebase. It is instruction-only and does not request unrelated credentials, binaries, or config paths, which is proportionate to that purpose.
Instruction Scope
The instructions direct the agent to use the 'existing local codebase' and workspace context to create plans. They do not instruct network exfiltration or reading unrelated system secrets, but they imply the agent will read repository files and context. Users should be aware that any sensitive material in the workspace could be included in analysis outputs.
Install Mechanism
No install spec and no code files are provided (instruction-only), which is the lowest-risk installation model — nothing will be written to disk by an installer.
Credentials
The skill requests no environment variables, credentials, or config paths. That aligns with a purely advisory, design-focused skill that analyzes local code.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or system-wide settings, and uses the default autonomous-invocation setting (normal). It does not require elevated persistence or privileges.
Assessment
This skill is instruction-only and coherent with its description: it will analyze your workspace and propose minimal implementation plans. Before installing or invoking it, consider: (1) the agent will read repository files — remove or avoid placing secrets in the workspace you don't want included in analysis; (2) review any plan output before applying changes to code or CI; (3) if you want tighter control, run the agent in a sandbox or explicitly restrict which files it can access or ask the skill to list which files it needs to read before proceeding. If the skill later requests network access, credentials, or an install script, treat that as a new risk and reevaluate.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d690cg6whjdjjk51w1m4e8184b5aa

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments