Instruments Profiling

v1.0.0

Use when profiling native macOS or iOS apps with Instruments/xctrace. Covers correct binary selection, CLI arguments, exports, and common gotchas.

3· 2.2k·5 current·5 all-time
byPeter Steinberger@steipete
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the SKILL.md instructions (xctrace/Instruments profiling). Minor metadata mismatches: the registry lists no OS restriction and no required binaries, yet the guidance clearly assumes a macOS/iOS environment with Xcode command-line tools (xcrun/xctrace, open, ps). This is expected for the stated purpose but the metadata could be more explicit.
Instruction Scope
The SKILL.md stays on-topic: it gives concrete CLI commands, checks, and troubleshooting steps for profiling apps. It references local paths, PIDs, and system privacy settings only in the context of profiling; it does not instruct collecting or transmitting unrelated data.
Install Mechanism
No install spec and no code files are present (instruction-only), so nothing is written to disk by the skill itself — this is the lowest-risk configuration for this purpose.
Credentials
The skill requires no environment variables or credentials. The commands it suggests operate on local files/processes (app bundles, /tmp traces) which is appropriate for profiling tasks.
Persistence & Privilege
always is false and model invocation is allowed (platform default). The skill does not request persistent/system-wide changes or other skills' credentials.
Assessment
This skill is a straightforward, instruction-only guide for using xctrace/Instruments — it appears coherent and benign. Before enabling it for an agent, ensure the agent will run on macOS with Xcode command-line tools installed, and be aware the instructions will run local shell commands that access app bundles, PIDs, and local trace files (e.g., /tmp). Do not use the skill on machines containing sensitive builds or data you wouldn't want the agent to access. If you want stricter metadata, ask the publisher to declare an OS restriction (macOS/iOS) and list required binaries (xcrun/xctrace) so the registry reflects the runtime assumptions.

Like a lobster shell, security has layers — review code before you run it.

latestvk978zqddqmyrtjwsejbgxkyb8h7yn76e

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments