Nm Leyline Quota Management
v1.0.0Quota tracking, threshold monitoring, and graceful degradation for rate-limited API services. quota, rate limiting, usage limits, thresholds.
⭐ 0· 42·1 current·1 all-time
by@athola
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the provided instructions and examples: quota tracking, threshold strategies, token/cost estimation, and integration patterns are all present and expected for a quota-management utility.
Instruction Scope
SKILL.md is instruction-only and contains example code for checking quotas, recording usage, estimating tokens, and reading file sizes for token estimation (estimate_file_tokens, preflight_check). Reading files is consistent with the stated purpose (estimating costs/tokens), but it does mean integrations using these patterns will need local filesystem access — ensure you only grant the agent access to files you intend to be analyzed.
Install Mechanism
No install spec or code files are executed; this is instruction-only, so nothing is downloaded or installed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The examples reference model names and cost rates only (no API keys or unrelated secrets).
Persistence & Privilege
always is false and the skill does not request elevated or persistent system presence. Autonomous invocation (default) is enabled but not combined with broad privileges or secrets.
Assessment
This skill is coherent for quota and rate-limit handling. Before enabling it for autonomous use, confirm the agent's filesystem and network permissions: the examples include functions that read files to estimate tokens, so only allow access to files you trust. Also review or vet the actual leyline QuotaTracker implementation you will use (the SKILL.md shows patterns but doesn't include the underlying code) before relying on it in production.Like a lobster shell, security has layers — review code before you run it.
latestvk973s03gj1awcr6kschh0xcfjd84r8sj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🦞 Clawdis
