system-design-solver2
v2.0.0系统设计面试教练(System Design Interview Coach)。当用户想要练习系统设计面试、请求设计某个系统、或希望模拟面试流程时,立即使用此 skill。适用场景包括:用户说"帮我练习系统设计"、"我要设计 XX 系统"、"帮我准备系统设计面试"、"模拟一道系统设计题"、"system desi...
⭐ 0· 584·5 current·5 all-time
by@wd1993
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (system design interview coach) align with the SKILL.md: all instructions are about running mock interviews, asking clarifying questions, estimating QPS/storage, and giving feedback. No unrelated capabilities or credentials are requested.
Instruction Scope
SKILL.md contains only conversational guidance, templates, and question lists for coaching; it does not instruct the agent to read files, access environment variables, call external endpoints, or transmit data outside the conversation. The scope stays within tutoring and simulated interview interactions.
Install Mechanism
There is no install spec and no code files — the skill is instruction-only, so nothing is written to disk or fetched during install.
Credentials
The skill requires no environment variables, credentials, or config paths. The questions it asks (DAU, QPS, latency targets) are legitimate for system-design coaching and do not imply access to unrelated secrets.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify other skills or system-wide settings. disable-model-invocation is false (normal) but there are no additional privileges requested.
Assessment
This skill is low-risk because it's instruction-only and asks the user questions to run a mock interview. Before installing/using it: (1) avoid pasting secrets or sensitive internal configs into the chat — the skill will ask for traffic/scale numbers but not credentials; (2) treat its architectural recommendations as guidance to be validated against your real constraints; (3) if you want automated code or infra changes, prefer a skill that explicitly requests necessary credentials and review those requests closely; (4) test it in a normal conversation to confirm behavior matches expectations.Like a lobster shell, security has layers — review code before you run it.
latestvk970c5x0v0bgtwa1fp5gb0yqwh81w37h
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
