ULTIMATE SKILL MATRIX
v2.0.0Comprehensive framework showcasing mastery in distributed systems, languages, cloud, architecture, performance, testing, AI/ML, blockchain, and real-time pla...
⭐ 0· 11·0 current·0 all-time
by@kosasih
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The skill name/description claim a comprehensive skill matrix and the single SKILL.md file contains exactly that content (professional competencies, tools, certifications). There are no unexplained environment variables, binaries, or install steps requested that would be unrelated to a static reference document.
Instruction Scope
SKILL.md is static content (no runtime commands, no references to system files, no steps that ask the agent to read credentials or external system state). The instructions do not instruct the agent to collect or transmit unrelated data.
Install Mechanism
No install specification is present (instruction-only). That is the lowest-risk pattern and appropriate for a static document.
Credentials
The skill declares no required environment variables, credentials, or config paths. No sensitive access is requested or implied by the SKILL.md content.
Persistence & Privilege
always is false (default) and model invocation is not disabled (default). This is normal for user-invocable skills. The skill does not request persistent system presence or modifications to other skills or system configuration.
Assessment
This skill is essentially a static professional skill/resume matrix and presents low technical risk as installed: it asks for no credentials, performs no installs, and contains no runtime commands. The main non-security consideration is provenance: the source and homepage are unknown, so treat claims of expertise or open-source repos as unverified. If you plan to rely on the skill for authoritative information (e.g., hiring, credential verification), ask the publisher for a homepage, repo links, or other verifiable evidence before trusting the claims. If the skill is later updated to include scripts, downloads, or requests for secrets, re-evaluate before enabling.Like a lobster shell, security has layers — review code before you run it.
latestvk97eeg66c182sb99cjvbbzccn184a70k
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
