PigX Server 后端开发
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This is a coherent instruction-only PigX backend development guide, with only purpose-aligned command examples and local credential-like configuration values to review.
This skill appears safe to install for PigX backend development. Before using it, confirm the local project path is correct, treat the included database/config passwords as development defaults only, and review any build, formatting, or run command before allowing an agent to execute it.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If followed, these commands may modify local source formatting or run local services.
These documented Maven commands can build the project, rewrite formatted source files, or start a local service. They are expected for a backend development guide and are not framed as automatic execution.
mvn clean install ... mvn spring-javaformat:apply ... cd pigx-boot && mvn spring-boot:run
Run commands only in the intended project checkout and review generated or reformatted changes before committing.
Using these values outside a local development setup could expose or weaken access to databases or encrypted configuration.
The guide includes database and configuration-decryption password values. They appear tied to local/project configuration, but they are credential-like values that should not be assumed safe for production.
username: postgres
password: postgres ... 配置文件已加密,密码为 `pigx`Confirm these are only local development defaults; replace or rotate them if they correspond to real shared, staging, or production secrets.
