Jarvis Codebase Mapper 01
v1.0.0Map unfamiliar codebases into modules, owners, and entrypoints. Use when handling development work that needs repeatable steps, quality gates, and practical...
⭐ 0· 697·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (map codebases to modules, owners, entrypoints) aligns with the SKILL.md playbook and output format. Nothing in the metadata asks for unrelated resources (no env vars, binaries, or config paths).
Instruction Scope
SKILL.md contains a high-level, structured workflow (inputs, playbook steps, quality gates, output format). It does not instruct the agent to read system files, access environment variables, call external endpoints, or perform arbitrary code execution. It does expect the user to provide artifacts (code, docs, logs) which is appropriate for the stated purpose.
Install Mechanism
No install spec and no code files — instruction-only. No downloads, package installs, or extracted artifacts are requested, so there is minimal installation risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. This is proportionate for an advisory/playbook skill that produces mapping and action plans.
Persistence & Privilege
always:false and the skill does not request persistent system presence or permissions. It does not modify other skills or system configs and does not require autonomous invocation privileges beyond the platform default.
Assessment
This skill is low-risk: it's an instruction-only playbook for producing plans and checklists and requests nothing from your environment. Before using it, avoid uploading sensitive secrets or private keys as input; only provide the code/artifacts necessary for the mapping task. If you want the agent to run commands or modify repositories automatically, that requires additional tooling or plugins — which increases risk and should be reviewed. Finally, treat outputs as guidance: verify suggested commands, owners, and changes before applying them in your environment.Like a lobster shell, security has layers — review code before you run it.
latestvk97c34eyrnnx9nd8twtq702s8h81d6tk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
