onewo-rtlinux
v1.0.4Linux real-time programming assistant. Generates, reviews, and modifies C code for periodic control tasks and interrupt-driven programs. Enforces RT scheduli...
⭐ 0· 130·0 current·0 all-time
by@xgkucas
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (Linux real-time C code generation/review) align with the SKILL.md content: it focuses on periodic control loops, IRQ handling, SCHED_FIFO, clock_nanosleep, mmap/ioremap, etc. No unrelated binaries, env vars, or installs are requested.
Instruction Scope
Instructions remain within Linux RT programming scope but mandate a System Environment Checklist that reads and changes system state (e.g., reading /sys and /proc, setting CPU governors, invoking 'sudo init 3'). Those commands are relevant for RT tuning but are potentially disruptive and require root. Several commands contain placeholders (e.g., '<core>', '<N>') or nonstandard checks ('irqaffinity' in cmdline) that are ambiguous and need clarification.
Install Mechanism
Instruction-only skill with no install spec and no code files—lowest install risk. The skill will not write code to disk or fetch external executables as part of installation.
Credentials
The skill does not request credentials, environment variables, or config paths. The only elevated actions implied are interactive sudo commands in the checklist; these are operational needs for RT tuning rather than hidden credential access.
Persistence & Privilege
always is false and the skill doesn't request persistent installation or modify other skills. However, the requirement to append the System Environment Checklist after every code response could repeatedly prompt privileged operations if the agent executes the checklist automatically—this is a behavioral/operational risk rather than a permission declaration.
Assessment
This skill appears to do what it says (Linux RT C code help), but its runtime checklist includes root-level and disruptive commands (e.g., 'sudo init 3', changing cpufreq governors) that will affect your machine and may terminate your GUI or change system behavior. Before using: (1) run the skill only on a dedicated test or development machine (not production); (2) do not blindly copy/paste sudo commands—understand each step and confirm there are no placeholders left unreplaced (e.g., '<core>', '<N>'); (3) avoid running 'sudo init 3' unless you intend to stop the graphical session; (4) prefer running checks read-only first (cat) and defer write operations until you have root access and a rollback plan; (5) ask the skill/author to clarify ambiguous checks (irqaffinity grep, placeholders) and to provide safe, non-destructive alternatives. If you need higher assurance, request a version that omits automatic privileged operations and provides an explicit checklist the user must manually authorize.Like a lobster shell, security has layers — review code before you run it.
latestvk976xe4x9234gejp5s7771q0yd83r9d9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
