fullstack-softwareddeveloper

v1.0.0

Design and develop secure Golang backend and Angular frontend web apps with role-based access, user registration, vehicle info management, and JWT authentica...

1· 232·1 current·1 all-time
byWesLon@weslon1987
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the SKILL.md: the skill claims to design and produce Go backend and Angular frontend code for RBAC, registration, vehicle management and JWT, and it only requires the agent to produce architecture and code snippets — no unrelated resources are requested.
Instruction Scope
Runtime instructions are limited to analyzing user requirements and producing architecture and secure code examples; they do not direct the agent to read local files, access environment variables, call external endpoints, or exfiltrate data.
Install Mechanism
No install specification or code files are present (instruction-only), so nothing is written to disk or downloaded during install.
Credentials
The skill declares no environment variables, credentials, or config paths; it does not ask for unrelated secrets or privileged tokens.
Persistence & Privilege
always is false and there are no install/modify actions; the skill does not request persistent system presence or modify other skills or system-wide settings.
Assessment
This skill is instruction-only and appears coherent with its stated purpose. Before using generated code in production: (1) review and test all code and dependency choices; (2) never paste real secrets (API keys, private keys) into prompts; (3) verify the JWT handling, session lifecycle, and secure storage of credentials in your environment; and (4) perform your own security review (dependency scanning, static analysis, and runtime testing) before deploying. Confidence is high because there are no install steps, requested credentials, or out-of-scope instructions.

Like a lobster shell, security has layers — review code before you run it.

latestvk971p9014y4k09f8hvas6spv1x82xp87

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments