Architecture Designer

v0.1.0

Use when designing new system architecture, reviewing existing designs, or making architectural decisions. Invoke for system design, architecture review, design patterns, ADRs, scalability planning.

3· 5.7k·41 current·43 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (architecture design, ADRs, scalability) align with the included files and runtime instructions. All referenced resources are local guidance documents relevant to system design.
Instruction Scope
SKILL.md instructs the agent to follow an architecture workflow and to load local reference files. It does not direct reading of unrelated system files, nor does it call external endpoints or request secrets.
Install Mechanism
No install spec and no code files that would be executed; the skill is instruction-only and therefore does not write or execute external artifacts on disk.
Credentials
The skill requires no environment variables, binaries, or credentials. There are no disproportionate or unexplained secret requests.
Persistence & Privilege
always is false and model invocation is allowed (default). The skill does not request persistent system presence or modify other skills/configuration.
Assessment
This skill is a local set of architecture templates and instructions and appears coherent with its stated purpose. It does not request credentials, install software, or contact external endpoints. Considerations before installing: (1) the publisher/homepage is not provided — treat it as an unsigned community contribution and prefer vetted internal templates if you have compliance requirements; (2) the skill will produce design advice but cannot enforce implementation — review any recommendations before applying them to production; and (3) avoid pasting sensitive production credentials or confidential architecture details into prompts when using any third-party skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk97edq6mzzths3cmwpcjrjf8j1808vqq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments