Authz

v1.0.0

Permissions, roles, policies, and enforcement points. Use when designing RBAC/ABAC or fixing authZ holes.

0· 58·0 current·0 all-time
byClawKK@codekungfu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the content: the skill provides a structured 4-stage workflow for authorization design and remediation. It requests no binaries, secrets, or system access that would be unrelated to its stated purpose.
Instruction Scope
SKILL.md contains only procedural guidance (questions to ask, stages, checklists). It does not instruct reading files, accessing environment variables, running shell commands, or sending data to external endpoints.
Install Mechanism
No install spec and no code files — instruction-only. This is low-risk because nothing will be written to disk or downloaded.
Credentials
No required environment variables, credentials, or config paths are declared or referenced in the instructions; asked capabilities are proportional to a documentation/advisory skill.
Persistence & Privilege
always is false and the skill does not request persistent or system-wide privileges or modifications to other skills; autonomous invocation (default) is present but not combined with other red flags.
Assessment
This skill is a high-level, procedural advisor for authorization design and remediation and appears internally consistent. Because it is instruction-only, it cannot access files or secrets on its own — its value comes from the recommendations it produces. Before installing or relying on its output, consider: (1) whether you need concrete code/config examples for your platform (this skill is intentionally generic), (2) have a domain expert review any policy changes it recommends before applying them, and (3) if you want the agent to operate on live systems, prefer a skill that explicitly declares the required credentials and installation steps so you can evaluate their scope.

Like a lobster shell, security has layers — review code before you run it.

latestvk975jpjnemc679sdf6kv52b29s83pjka

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments