Nm Parseltongue Python Performance

v1.0.0

Python performance profiling and optimization: bottleneck detection, memory tuning, benchmarking

0· 41·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and included module files all focus on Python profiling, memory tuning, benchmarking, and optimization patterns. There are no unrelated credential or binary requirements listed.
Instruction Scope
SKILL.md and module files provide code snippets and guidance for cProfile, tracemalloc, py-spy, memory-profiler, line-profiler, pytest-benchmark, etc. Instructions do not ask the agent to read unrelated files, exfiltrate data, or contact external endpoints; suggested commands are limited to profiling/benchmarking.
Install Mechanism
This is instruction-only with no install spec. The modules suggest installing common pip packages (e.g., memory-profiler, py-spy, pytest-benchmark), which is proportionate and expected for a profiling guide.
Credentials
No environment variables, credentials, or config paths are requested. The guidance does not reference accessing secrets or unrelated system configuration.
Persistence & Privilege
Skill is not always-enabled and does not request elevated persistence. Normal autonomous invocation is allowed (platform default) and appropriate for a utility skill; there is no indication it modifies other skills or system-wide settings.
Assessment
This skill is an instructional collection of profiling and optimization patterns and appears internally consistent. Before using: (1) be aware that following the guide may lead you to pip-install third-party packages—only install packages you trust from PyPI; (2) tools like py-spy require permissions to inspect running processes, so avoid profiling sensitive production workloads without authorization; (3) the snippets are examples, not production-ready code—review and adapt them for your environment. Overall this looks safe and appropriate for its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dd5t295hgq45z07yyszwa7d84vt1w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Clawdis

Comments