OpenClaw 编程 智能体 Workflows

v1.0.0

Delegate 编程 tasks to Codex, Claude 代码, Pi, or OpenCode from bash with safe launch modes, background monitoring, and repo-isolated review workflows.

0· 35·0 当前·0 累计
danielsinewe 头像by @danielsinewe (Daniel Sinewe)·MIT-0
下载技能包
License
MIT-0
最后更新
2026/4/17
安全扫描
VirusTotal
可疑
查看报告
OpenClaw
可疑
medium confidence
The skill's instructions broadly match its stated purpose, but it omits some required local tools and explicitly recommends bypassing permission controls and running agents in full-auto/PTY modes — behaviors that increase risk and raise coherence questions.
评估建议
This skill is coherent with its goal of orchestrating other coding agents, but there are actionable concerns you should consider before using it: - Missing local dependencies: Examples call git, gh, mktemp, and bash behaviors not declared in the metadata. Ensure those CLIs exist and are the versions you expect. - Permission bypass: The advice to run Claude Code with '--permission-mode bypassPermissions' effectively disables safety controls. Avoid that flag unless you fully trust the agent binar...
详细分析 ▾
用途与能力
The name/description claim to delegate coding agents, and the skill only requires at least one agent binary (claude, codex, opencode, pi), which aligns with the purpose. However, the runtime instructions routinely call other local tools (git, gh, mktemp, bash) and rely on CLI semantics (process action:*, openclaw system event) that are not declared in the metadata. The omission of utilities like git/gh and reliance on unrestricted cloning/execution is an inconsistency (not necessarily malicious) that the user should be aware of.
指令范围
SKILL.md instructs the agent to run external coding agents in PTY/full-auto modes and to clone and execute inside repositories. It explicitly recommends Claude Code use '--permission-mode bypassPermissions' (which appears to circumvent permission constraints). The instructions permit launching long-running background sessions and submitting interactive responses — all of which can execute arbitrary code inside local checkouts. While these actions are within the claimed purpose, the permission-bypass recommendation and the lack of explicit safety checks or audit/verification steps are significant scope concerns.
安装机制
This is an instruction-only skill with no install spec and no code files, so nothing is written to disk by installation. That is the lowest install risk.
凭证需求
No environment variables or credentials are requested by the skill metadata, which is proportionate. That said, example workflows expect tools that may themselves require credentials (e.g., gh, codex/claude API keys) but the skill does not declare or explain how to supply or protect those. The explicit encouragement to use '--permission-mode bypassPermissions' for Claude Code is disproportionate for a skill that doesn't otherwise request elevated access — it suggests bypassing protections outside the skill's declared scope.
持久化与权限
always:false and no install-time persistence are set. The skill can be invoked autonomously per platform defaults, which is expected. It does not request to modify other skills or agent-wide settings.
安全有层次,运行前请审查代码。

License

MIT-0

可自由使用、修改和再分发,无需署名。

运行时依赖

无特殊依赖

版本

latestv1.0.02026/4/17

Initial release: OpenClaw coding-agent orchestration workflow with execution matrix, background session control, and repo-safe review patterns.

可疑

安装命令

点击复制
官方npx clawhub@latest install openclaw-coding-agent-workflows
镜像加速npx clawhub@latest install openclaw-coding-agent-workflows --registry https://cn.longxiaskill.com镜像同步中
需要定制?告诉我你的需求 →
数据来源ClawHub ↗ · 中文优化:龙虾技能库