map-optimization-strategy

v0.1.0

Strategy for solving constraint optimization problems on spatial maps. Use when you need to place items on a grid/map to maximize some objective while satisf...

0· 37·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the SKILL.md content: a three-phase algorithmic strategy for placing items on a map. There are no unexpected environment variables, binaries, or config paths requested that would be unrelated to the stated purpose.
Instruction Scope
SKILL.md contains algorithmic guidance and a small Python skeleton for implementing the strategy. It does not instruct the agent to read system files, access environment variables, call external endpoints, or exfiltrate data. The scope stays within describing how to prune, score, and search placements.
Install Mechanism
There is no install spec and no code files. This instruction-only format means nothing is written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. It does not request broad or unrelated secrets, which is proportionate for a strategy guide.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify other skills or system-wide settings. Default autonomous invocation is allowed but that is the platform norm and not a concern here given the skill's limited scope.
Assessment
This skill is a low-risk, instruction-only guide (no downloads, no credentials). Before installing, consider: if you or an agent implement the provided pseudocode, review any generated code before running it; do not paste secrets into prompts; and test implementations on non-sensitive data. If you expect the agent to autonomously execute code derived from these instructions, ensure your agent's runtime sandboxing and execution policies are appropriate.

Like a lobster shell, security has layers — review code before you run it.

latestvk9760dyn2px9qdsz63cqnw8e9n84t85w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments