task-decomposer-skill

v1.0.0

任务拆解技能 - 将需求分解为可执行的最小任务单元。 使用场景:(1) 需求分析时拆解任务 (2) 项目规划时细化工作 (3) 估算工时 (4) 制定迭代计划。 支持技术栈:Java/Spring Boot、Node.js、Python、Go、前端项目。

1· 166·1 current·1 all-time
bywhisky@whiskeyforsun
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name, description and supported stacks align with the SKILL.md content and templates. All guidance and templates are coherent with a task-decomposition/planning utility and do not ask for unrelated capabilities (e.g., cloud credentials or system-level access).
Instruction Scope
SKILL.md contains only decomposition methodology, templates, examples and configurable options. It does not instruct the agent to read local files, environment variables, or send data to external endpoints beyond producing formatted task lists.
Install Mechanism
No install spec or code files beyond documentation are included (instruction-only). This yields a low on-disk/installation footprint and no downloaded artifacts or executables to analyze.
Credentials
The skill declares no required environment variables, credentials, or config paths. The instructions do not reference secrets or external service tokens, so requested access is proportional to the described purpose.
Persistence & Privilege
Flags show always:false and default autonomous invocation allowed (platform default). The skill does not request permanent presence, nor does it modify other skills or system settings in the provided docs.
Assessment
This skill is internally coherent and low-risk: it's purely documentation/instruction for breaking requirements into small tasks and does not request secrets or install code. Before installing, consider governance questions: the source/homepage is unknown so verify the publisher/trust if you require an auditable supply chain. When using the skill, avoid pasting sensitive secrets or credentials into prompts (the skill's templates reference service features like login flows but don't need real credentials). If you want extra caution, test the skill in a limited environment or review future versions for added install steps or env requirements.

Like a lobster shell, security has layers — review code before you run it.

latestvk976xny4s2wbanf1jyftswy6ex83qy9d

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📋 Clawdis

Comments