Optimize
Repository: openclaw/skills
Author: zhmza · Source status: Clear source
Optimize OpenClaw performance and prevent lag.
Score basis:Clear source · High risk signals · OpenClaw
Compare skills
Pick 2–4 skills and compare what really matters: fit, risk, install effort, and community signal.
Comparison matrix
Highlights show current best; tooltip explains diff/best rules.
SAS-v2.1 diff rules / risk tag notes
Start with the matrix. Open this section when you need to understand audit grades, top threats, control gaps, and best-value highlights.
Suggested baseline
Search to add skills, or paste 2–4 comma-separated slugs.
How differences are detected
A row is marked different when selected skills have distinct values. Only-differences mode hides rows that are identical.
How best values are highlighted
Audit score, evidence confidence, trust score, and community signal prefer higher values; execution risk and install friction prefer lower values.
How to read risk tags
Risk tags come from SAS-v2.1 public-evidence signals and point to command, network, secret, context, or supply-chain items to review before install.
Selected audit signals
Proactive Ops Monitor
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
checkout-agent
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, shell without guardrails, network without allowlist
tripo3d
Execution risk:High
Threat tags:prompt injection, tool poisoning, unexpected code execution
Control gaps:missing license, broad permissions, shell without guardrails
| Dimension | Proactive Ops Monitor | checkout-agent | tripo3d |
|---|---|---|---|
| SAS-v2.1 pre-install audit | |||
Audit grade | C · Review first | C · Review first | D · Limited evidence |
Execution risk | High | High | High |
Threat tags | unexpected code execution, identity privilege abuse, data exfiltration | unexpected code execution, identity privilege abuse, data exfiltration | prompt injection, tool poisoning, unexpected code execution |
Control gaps | missing license, broad permissions, shell without guardrails | missing license, shell without guardrails, network without allowlist | missing license, broad permissions, shell without guardrails |
Permission summary | Permission review, Network, Secrets, Command | Permission review, Network, Secrets, Command | Permission review, Network, Secrets, Command |
Evidence confidence | 69% | 65% | 69% |
| Source & provenance | |||
Provenance | openclaw/skills | openclaw/skills | openclaw/skills |
Category | Operations & Infra | Web & Automation | Design & Content |
Freshness | |||
| Risk & trust | |||
Trust score | 85 | 85 | 85 |
Audit signals | |||
| Install & compatibility | |||
Supported tools | OpenClaw | OpenClaw | Universal |
Install method | script-backed | script-backed | script-backed |
Install friction | |||
| Community | |||
Stars | 0 | 0 | 0 |
Repository: openclaw/skills
Author: jpengcheng523-netizen · Source status: Clear source
Provides monitoring and alerting for agent abnormal behavior metrics with Prometheus and Grafana support, including P99 latency, error rates, anomaly detection, and custom alert rules.
Score basis:Clear source · High risk signals · Universal
Repository: openclaw/skills
Author: neroagent · Source status: Clear source
Core memory resilience layer: WAL (Write-Ahead Log), Working Buffer, and three-layer memory integration.
Score basis:Clear source · Risk needs review · Claude
Repository: openclaw/skills
Author: graveyardprotocol · Source status: Clear source
Close empty Solana SPL token accounts and reclaim locked rent SOL back to your wallet, track Ghost Point earnings, claim SOUL tokens at the end of each weekly epoch, manage multiple encrypted wallets, and view lifetime a
Score basis:Clear source · High risk signals · OpenClaw
2026-04-02 |
2026-04-02 |
2026-04-02 |
needs credentials, writes files |
needs credentials, network access |
needs credentials, network access, runs shell, writes files |
Permission hints | verify source provenance before install | verify source provenance before install | verify source provenance before install |
|---|
55 |
55 |
65 |