Compose For Agents
Repository: compose-for-agents
Author: docker · Source status: Clear source
Build and run AI agents using Docker Compose.
Score basis:Clear source · High execution risk · Universal · Evidence completeness 65%
Compare skills
Pick 2–4 skills and compare what really matters: fit, risk, install effort, and community signal.
Comparison matrix
Highlights show current best; tooltip explains diff/best rules.
Score-basis diff rules / risk tag notes
Start with the matrix. Open this section when you need to understand audit grades, top threats, control gaps, and best-value highlights.
Suggested baseline
Search to add skills, or paste 2–4 comma-separated slugs.
How differences are detected
A row is marked different when selected skills have distinct values. Only-differences mode hides rows that are identical.
How best values are highlighted
Pre-install score, evidence completeness, and community signal prefer higher values; execution risk and install friction prefer lower values.
How to read risk tags
Risk tags come from SAS-v2.1 public-evidence signals and point to command, network, secret, context, or supply-chain items to review before install.
Selected audit signals
toolcall
Execution risk:High
Threat tags:unexpected code execution, data exfiltration, human approval gap
Control gaps:missing license, broad permissions, shell without guardrails
agentic-ai-engineering
Execution risk:High
Threat tags:prompt injection, tool poisoning, unexpected code execution
Control gaps:missing license, broad permissions, shell without guardrails
NVIDIA-Nemotron-3-Super
Execution risk:High
Threat tags:unexpected code execution, data exfiltration, human approval gap
Control gaps:missing license, broad permissions, shell without guardrails
| Dimension | toolcall | agentic-ai-engineering | NVIDIA-Nemotron-3-Super |
|---|---|---|---|
| Pre-install decision | |||
Pre-install score | 67 · Manual review | 82 · Manual review | 82 · Manual review |
Score basis | Clear source, High execution risk, Universal | Clear source, High execution risk, Universal | Clear source, High execution risk, Universal |
Execution risk | High | High | High |
Threat tags | unexpected code execution, data exfiltration, human approval gap | prompt injection, tool poisoning, unexpected code execution | unexpected code execution, data exfiltration, human approval gap |
Control gaps | missing license, broad permissions, shell without guardrails | missing license, broad permissions, shell without guardrails | missing license, broad permissions, shell without guardrails |
Permission summary | Permission review, Network, Command | Permission review, Network, Command | Permission review, Network, Command |
Evidence completeness | 65% | 68% | 65% |
| Source & provenance | |||
Provenance | nhevers/toolcall | agenticloops-ai/agentic-ai-engineering | cobusgreyling/NVIDIA-Nemotron-3-Super |
Category | Dev & Engineering | Dev & Engineering | Dev & Engineering |
Freshness | |||
| Risk & permission signals | |||
Audit signals | No explicit signals | No explicit signals | No explicit signals |
Permission hints | repository clone, local runtime dependencies | repository clone, local runtime dependencies | repository clone, local runtime dependencies |
| Install & compatibility | |||
Supported tools | Universal | Universal | Universal |
Install method | script-backed | script-backed | script-backed |
Install friction | |||
| Community | |||
Stars | 8 | 49 | 26 |
Repository: ccNexus
Author: lich0821 · Source status: Clear source
Intelligent API gateway for Claude Code and Codex CLI - rotate endpoints, monitor usage, and seamlessly integrate OpenAI, Gemini, and other platforms.
Score basis:Clear source · High execution risk · Universal · Evidence completeness 65%
Repository: tool_calling_api
Author: Shuyib · Source status: Clear source
This project demonstrates function-calling with Python and Ollama, utilizing the Africa's Talking API to send airtime and messages to phone numbers using natural language prompts.
Score basis:Clear source · High execution risk · Universal · Evidence completeness 67%
Repository: DWMShield
Author: ahossu · Source status: Clear source
Kernel-mode research tool that demonstrates how Windows DWM enforces WDA_EXCLUDEFROMCAPTURE by directly calling the undocumented win32kfull!GreProtectSpriteContent function.
Score basis:Clear source · High execution risk · Universal · Evidence completeness 65%
2026-01-27 |
2026-04-07 |
2026-04-02 |
40 |
40 |
40 |