.net-full-stack-architect

v1.0.0

Automation skill for .net-full-stack-architect.

0· 108·0 current·0 all-time
byWesLon@weslon1987
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description claim an architecture-design assistant for a .NET WebApi framework and the SKILL.md contains role, goals, constraints, workflow and output format aligned with that purpose. It does not request unrelated binaries, services, or credentials.
Instruction Scope
The runtime instructions are confined to architecture/design tasks: analyzing requirements, designing layers, integrating specified components (SqlSugar, Swagger, JWT, Serilog/ELK), and producing JSON-formatted outputs. The skill does not instruct the agent to read local files, access environment variables, execute shell commands, or transmit data to external endpoints.
Install Mechanism
No install spec and no code files — the skill is instruction-only which minimizes on-disk risk. Nothing is downloaded or installed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. This is proportionate for a design/consulting skill. (If later the agent asks you to provide DB connection strings or keys to produce sample code, those would be user-supplied and should be treated carefully.)
Persistence & Privilege
always:false and user-invocable:true (standard). disable-model-invocation:false is the platform default and not itself risky. The skill does not request persistent system-level privileges or modify other skills.
Assessment
This is an instruction-only architecture assistant and appears coherent. Before using it: do not paste real production credentials or private keys into prompts; provide only sanitized example data if you want sample configs or code. Review any generated code, dependency recommendations, or configuration for security (JWT key handling, DB credentials management/migrations, logging redaction before shipping to ELK) and for licenses of third-party libraries. Test generated example projects in an isolated environment and perform code review and security scanning before deploying to production.

Like a lobster shell, security has layers — review code before you run it.

latestvk97aqwb1r7c152ayntr0w67w5s83kbps

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments