Estimation Patterns
v1.0.0Practical estimation techniques for software tasks — methods comparison, decomposition, complexity multipliers, buffer calculation, bias awareness, and communication strategies. Use when estimating features, sprint planning, or presenting timelines to stakeholders.
⭐ 0· 759·0 current·0 all-time
by@wpank
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (estimation techniques) match the SKILL.md and README content. The skill does not request unrelated binaries, env vars, or credentials.
Instruction Scope
SKILL.md contains guidance on estimation methods, decomposition, multipliers, buffers, and calibration only. It does not instruct the agent to read system files, access environment variables, or contact external endpoints.
Install Mechanism
This is instruction-only (no install spec or code files). README suggests using npx/clawhub and copying files into user skill directories; these are standard package/install actions but run on the user's machine. As a precaution, inspect the remote repo before running npx commands or copying files.
Credentials
No environment variables, credentials, or config paths are requested — proportional to an informational/meta skill.
Persistence & Privilege
always:false and no instructions to modify other skills or system-wide agent settings. Installation steps copy files into user skill directories (normal for manual install).
Assessment
This skill appears coherent and safe: it only contains written guidance for estimation and asks for no credentials. Before installing, inspect the repository referenced in the README (or the files provided) to confirm you trust the source. Be cautious when running npx commands or copying files into ~/.cursor or other home directories — those actions write to disk, so verify the remote package/repo first. If you want extra assurance, open the README and SKILL.md locally and read them before running any install commands.Like a lobster shell, security has layers — review code before you run it.
latestvk9702s4b5x8d1d4jk3q6sg3s5580w7tw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
