Arquitecto Categorico
v1.0.1Disena y audita arquitecturas de datos y APIs con teoria de categorias. Usar cuando haga falta formalizar un dominio en PostgreSQL DDL, JSON Schema, OpenAPI,...
⭐ 0· 122·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (categorical data/API design and audits) match the content of SKILL.md and the included reference corpus. The bundle provides many local KB/playbook files that the skill instructs the agent to read and use; nothing requested (env, binaries, installs) is outside what this kind of authoring/audit skill would need.
Instruction Scope
Runtime instructions direct the agent to load playbooks and read files under {baseDir}/references (playbooks and KB). This stays within the stated domain (modeling, schema, audits) and does not instruct accessing unrelated system paths, credentials, or external endpoints. Note: the skill assumes read access to workspace files under {baseDir}; confirm at runtime that {baseDir} resolves to the intended bundle directory and not an unexpected path.
Install Mechanism
There is no install spec and no code to write to disk; the skill is instruction-only. This is the lowest-risk install mechanism and is proportionate to the stated purpose.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. That aligns with an offline, document-driven modeling/audit assistant.
Persistence & Privilege
always:false and normal autonomous invocation are set (defaults). The skill does not request permanent presence or elevated privileges and does not appear to modify other skills or system settings. As with any skill that can be invoked autonomously, consider whether you allow it to run without supervision in contexts where generated artifacts might be sensitive.
Assessment
This skill is an instruction-only playbook that uses the included {baseDir}/references corpus to produce schemas, DDL, audits and diagrams; it requests no credentials and installs nothing, so its footprint is small and coherent. Before enabling it: (1) verify the workspace baseDir used at runtime indeed points to the included references (so the agent reads the intended materials), (2) review the included KB files for any proprietary or sensitive content you don't want the agent to read or expose, and (3) if you let agents invoke skills autonomously, be aware generated artifacts may contain design or IP-sensitive material — restrict outbound network access or review outputs if that matters. If you need higher assurance, run the skill in an isolated/test workspace and inspect its outputs and any file reads the agent performs.Like a lobster shell, security has layers — review code before you run it.
latestvk977d88s24kb7htyesb2egnshn83yca1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
