Golang Observability
v1.1.3Golang everyday observability — the always-on signals in production. Covers structured logging with slog, Prometheus metrics, OpenTelemetry distributed traci...
⭐ 0· 90·0 current·0 all-time
bySamuel Berthe@samber
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (Go observability) align with the declared requirements: it requires the 'go' binary and is an instruction-only skill. Allowed tooling (git, go, golangci-lint, read/edit/write) is appropriate for instrumenting and modifying Go code. No unrelated cloud credentials or system paths are requested.
Instruction Scope
SKILL.md is an extensive instruction set for adding logs/metrics/tracing/profiling/RUM. It recommends adding instrumentation, editing code, and configuring third-party backends (PostHog, Segment, Pyroscope) via environment variables. It does not instruct reading unrelated system secrets or exfiltrating data, but it does reference integration endpoints and env vars that an implementer must supply. The skill also mentions launching parallel sub-agents to audit coverage (expected for an automation-capable coding assistant).
Install Mechanism
No install spec and no code files are included; instruction-only skills are low-risk because they do not download or execute external packages during install.
Credentials
The skill declares no required environment variables or credentials (proportionate). However the guidance contains many examples that use env vars and third-party API keys (POSTHOG_API_KEY, SEGMENT_WRITE_KEY, PYROSCOPE_URL, PROFILING_ENABLED). This is expected for observability integrations, but implementers must ensure keys are kept out of source and not hard-coded.
Persistence & Privilege
The skill is not always-on (always:false), does not request persistent system-level privileges, and is user-invocable. Autonomous model invocation remains enabled (platform default) but is not combined with excessive privileges or credential requests.
Assessment
This skill appears coherent and focused on Go observability best practices, but before installing or letting an agent run it in your repo, consider the following:
- Review all suggested code changes in PR form before merging. The skill includes instructions that modify code (logging, metrics, middleware) and has Write/Bash permissions in its allowed-tools list — avoid automatic commits without human review.
- Do NOT hard-code API keys or service URLs in code. Use environment variables or a secrets manager for PostHog, Segment, Pyroscope, etc. The SKILL.md references many env vars but does not request them from the platform — you remain in control of secrets.
- Secure profiling endpoints (pprof) and continuous-profiling backends. The skill recommends toggling profiling via env vars and warns to protect pprof; follow that: never expose pprof publicly and be cautious sending profiling data to third-party SaaS.
- Avoid sending PII to analytics/CDPs. The guidance repeatedly warns about identity keys and GDPR/CCPA — enforce those rules and confirm the agent's changes respect data-minimization and consent checks.
- If you will allow autonomous agent runs, restrict them to non-production repos/environments (or require explicit approval for production changes). Autonomous invocation plus repo write access increases blast radius if misapplied.
If you want deeper assurance, ask the skill owner for an example PR or patch the agent would create for a small change (e.g., add JSON slog handler) and review that patch before allowing broader runs.Like a lobster shell, security has layers — review code before you run it.
latestvk9791792k6wyea9c2jjj24bmzd841bvm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📡 Clawdis
Binsgo
