Firm Observability Pack
v1.0.0Observability pipeline and CI audit pack. JSONL-to-SQLite trace ingestion and CI workflow validation. 2 observability tools.
⭐ 0· 278·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and the two tools (JSONL→SQLite ingestion and CI workflow checks) line up. The only declared dependency (mcp-openclaw-extensions >= 3.0.0) is plausible for adding helper primitives; there are no unrelated env vars, binaries, or config paths requested.
Instruction Scope
SKILL.md is scoped to ingesting user-supplied traces and validating user-supplied CI configs. It does not instruct reading unrelated system files or exfiltrating data. However, the instructions are high-level and lack detail about what validations/transforms occur, so a human review is advised before running on sensitive production data.
Install Mechanism
No install spec and no code files — instruction-only — so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill does not request any environment variables, credentials, or config paths; that is proportional to its described functionality.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skill configs. It is user-invocable and may be autonomously invoked by the agent (platform default).
Assessment
This skill is instruction-only and appears coherent with its purpose, but it was generated by an AI and provides only high-level behavior. Before installing or running it on real data: (1) confirm the source and trustworthiness of mcp-openclaw-extensions >=3.0.0; (2) run the tools in an isolated/non-production environment first; (3) only pass non-sensitive traces or CI configs until you verify what checks/transforms are performed; and (4) request or review detailed documentation or code for the pipeline/check tools if you need stronger assurances.Like a lobster shell, security has layers — review code before you run it.
latestvk972mm956r804a4e3r4jzsk4vh824x1p
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
