C#

v1.0.1

Avoid common C# mistakes — null traps, async pitfalls, LINQ gotchas, and disposal leaks.

3· 1.2k·4 current·4 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill's name, description, and included .md files all align: they are C# guidance documents. The only minor mismatch is the declared required binary 'dotnet' in metadata — none of the instructions actually run dotnet or require it to read the docs. Requiring the dotnet binary is plausible if the agent were to compile/run examples, but the skill itself contains only static guidance.
Instruction Scope
SKILL.md and the included files only contain static advice about nulls, async, LINQ, disposal, types, and collections. There are no runtime commands, no references to reading arbitrary system files or environment variables, and no instructions to transmit data to external endpoints.
Install Mechanism
No install spec and no code files — this is the lowest-risk pattern (instruction-only). Nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. This is proportional to its purpose as a static reference.
Persistence & Privilege
The skill is not always-enabled and uses normal autonomous-invocation defaults. It does not request elevated persistence or cross-skill configuration changes.
Assessment
This skill is a static collection of C# best-practice notes and appears internally consistent. The only minor oddity is the declared 'dotnet' binary requirement in the metadata despite there being no instructions that run code; that requirement is harmless but may be unnecessary. If you plan to allow the agent to execute example code, review any code before executing (running untrusted code with dotnet could be risky). Otherwise, it's safe from credential exfiltration or external network behavior — no secrets, no installers, no endpoints are present.

Like a lobster shell, security has layers — review code before you run it.

latestvk978ykm4nyakebvrz7sg4bqe2n815v0e

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

💜 Clawdis
OSLinux · macOS · Windows
Binsdotnet

Comments