reflow-profile-compliance-toolkit

v0.1.0

Deterministic handbook-grounded retrieval and thermocouple computations for reflow profile compliance outputs such as ramp, TAL, peak, feasibility, and selec...

0· 50·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (reflow profile computations and handbook extraction) match the SKILL.md content. No unrelated binaries, env vars, or installs are requested.
Instruction Scope
SKILL.md tells the agent to extract numeric limits from a handbook (handbook.pdf) and to compute metrics from thermocouple/MES data. This is consistent with the purpose, but it implicitly requires the agent to read user-provided files (handbook, thermocouple traces, MES exports). The instructions do not direct sending data to external endpoints. Confirm where the handbook and trace files will come from and limit access to only the needed files.
Install Mechanism
Instruction-only skill with no install spec or code files; nothing is written to disk or downloaded by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested — proportional and minimal for the stated task.
Persistence & Privilege
always:false and default invocation settings; the skill does not request persistent/system-wide presence or to modify other skills.
Assessment
This is an instruction-only toolkit that appears coherent and low-risk, but it requires the agent to read your handbook (PDF) and thermocouple/MES data files to work correctly. Before installing or invoking it: (1) ensure the agent is only given access to the specific handbook and trace files you intend it to use (limit file scope); (2) verify handbook version/authority and units (°C vs °F, seconds vs ms) to avoid misinterpretation; (3) validate the implementation on known test runs to confirm rounding/edge-case handling (NaN, zero/negative dt, identical timestamps); (4) confirm outputs will not be automatically transmitted outside your environment; and (5) if you need auditability, request the agent to produce intermediate reports (extracted constraints, selected segments) so you can review how handbook rules were applied.

Like a lobster shell, security has layers — review code before you run it.

latestvk97501eaqrwcqax8myh8gdc6gs849gav

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments