Post-Mortem & Incident Review

v1.0.0

Guide structured, blameless post-mortems with root cause analysis, action tracking, and prevention steps to reduce repeat production incidents and outages.

0· 506·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and content align: the skill provides post‑mortem templates, RCA guidance, cost calculators, and quarterly review steps. It does not request unrelated binaries, env vars, or credentials.
Instruction Scope
SKILL.md contains only templates, rules, calculators, and procedural guidance. It does include external links to AfrexAI pages (product/playbook links) and suggestions to 'deploy agents' but does not instruct the agent to read arbitrary host files, environment variables, or to transmit incident data to third parties. Be aware that following the external links or using the guidance to build agents could lead you to external services.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is downloaded or written to disk by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested; nothing disproportionate is required for the stated purpose.
Persistence & Privilege
always:false and default invocation settings. The skill does not request persistent presence or modification of other skills or system settings.
Assessment
This skill appears coherent and safe in scope: it's a template and playbook for conducting blameless post‑mortems. Before installing, verify the source (the registry metadata lists an opaque owner and no homepage), and consider these practical points: do not paste sensitive production logs, PHI, PCI data, or full incident data into any external site or AI without appropriate controls; confirm your compliance obligations (HIPAA, PCI, etc.) noted in the doc before sharing details; be cautious if you follow the external AfrexAI links or build agents from this guidance — review any third‑party privacy/terms and avoid sending secrets or raw logs to external services. If you need higher assurance, ask the publisher for a canonical homepage, a contact, or a provenance artifact (GitHub repo, signed release) before enabling the skill.

Like a lobster shell, security has layers — review code before you run it.

SREvk9729a5p9hz4468wvpy02dqn3981fwcqblamelessvk9729a5p9hz4468wvpy02dqn3981fwcqincidentvk9729a5p9hz4468wvpy02dqn3981fwcqlatestvk9729a5p9hz4468wvpy02dqn3981fwcqopsvk9729a5p9hz4468wvpy02dqn3981fwcqpost-mortemvk9729a5p9hz4468wvpy02dqn3981fwcqroot-causevk9729a5p9hz4468wvpy02dqn3981fwcq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments