MicroService Metric Skill

v1.0.0

分析 Java 业务代码,识别监控指标项,提供指标定义、标签建议及采集方案,支持AOP类补充参考。

0· 51·0 current·0 all-time
byAzr@azrcn
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (identify metrics from Java business code) aligns with the runtime instructions: scan Java service/controller/manager/facade classes, infer metrics from method names, parameters, returns, exceptions, timing, and optionally AOP classes. No unrelated resources (cloud credentials, system config) are requested.
Instruction Scope
The SKILL.md directs the agent to read user-provided Java files and — with explicit user consent — to scan project AOP/Interceptor/Filter classes. This is coherent for the purpose, but it means the agent will process source files from the user's repository. Users should be aware the agent will examine code that may contain sensitive information (credentials, private data) if they allow scanning whole projects; the skill itself does not declare any restrictions beyond file-glob patterns.
Install Mechanism
No install specification and no code files are present (instruction-only). This is low-risk: nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths. The requested access (reading source files and optionally AOP classes) is proportionate to the stated goal.
Persistence & Privilege
The skill does not request persistent/always-on presence and has no install actions that modify agent configuration. Autonomous invocation is allowed by platform default but is not combined with other concerning privileges.
Assessment
This skill appears internally consistent and does not request credentials or perform installs. Before using it, explicitly select which files or directories to analyze (avoid scanning entire repos with secrets). Be aware that the agent will read and process your source code — if your platform sends prompts or files to external LLM services, that code may be transmitted off-host. If you need guarantees that code will not leave your environment, confirm the runtime privacy model or perform the analysis locally with tools you control.

Like a lobster shell, security has layers — review code before you run it.

latestvk970ay1cbjekvwhfb6p58a1g8x84cxhv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments