CLI Design Framework

v1.0.2

Use when designing a new CLI, reviewing an existing CLI, or resolving uncertainty about a CLI's role, user type, interaction form, statefulness, risk profile...

1· 210·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (CLI design/review framework) match the contents: SKILL.md plus taxonomy, templates, and examples. There are no environment variables, binaries, or other external resources declared that would be unexpected for a documentation/instruction skill.
Instruction Scope
Runtime instructions are purely procedural guidance for classifying and designing CLIs and reference bundled files (taxonomy, templates, examples). They do not instruct reading system files, environment variables, network endpoints, or sending data externally.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is downloaded or written to disk. This is the lowest-risk form of a skill.
Credentials
The skill declares no required environment variables, credentials, or config paths. The instructions do not reference undeclared secrets or unrelated external services.
Persistence & Privilege
always is false and the skill has no install-time hooks or claims to modify other skills or system settings. It does not request persistent presence or elevated privileges.
Assessment
This is a documentation-style, instruction-only skill for designing/reviewing CLIs. It does not install code, request credentials, or access system paths. You can safely use it to generate blueprints or reviews. Because the skill's source is listed as unknown, review the included templates/examples to ensure they match your expectations and coding/licensing needs before adopting generated designs. If you want to be extra cautious, open the SKILL.md and example files (they're bundled) to confirm nothing in the guidance asks the agent to read private files or call undeclared external services.

Like a lobster shell, security has layers — review code before you run it.

clivk97dvyp92fhxgrndjvaw336hz582ts03designvk97dvyp92fhxgrndjvaw336hz582ts03frameworkvk97dvyp92fhxgrndjvaw336hz582ts03latestvk97dvyp92fhxgrndjvaw336hz582ts03reviewvk97dvyp92fhxgrndjvaw336hz582ts03

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments