Skip to content
← Registry
Trust Report

10x-patterns

Patterns and practices that dramatically accelerate development velocity. Covers parallel execution, automation, feedback loops, workflow optimization, and anti-pattern avoidance. Use when starting projects, planning sprints, optimizing workflows, or onboarding developers.

84
SUSPICIOUS
Format: openclawScanner: v0.7.1Duration: 14msScanned: 7d ago · Apr 1, 11:22 PMSource →
Embed this badge
AgentVerus SUSPICIOUS 84AgentVerus SUSPICIOUS 84AgentVerus SUSPICIOUS 84
[![AgentVerus](https://agentverus.ai/api/v1/skill/cba534c1-8e6b-498c-a378-159848b42260/badge)](https://agentverus.ai/skill/cba534c1-8e6b-498c-a378-159848b42260)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/cba534c1-8e6b-498c-a378-159848b42260/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"cba534c1-8e6b-498c-a378-159848b42260","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/cba534c1-8e6b-498c-a378-159848b42260/trust

Category Scores

70
Permissions
100
Injection
100
Dependencies
55
Behavioral
70
Content
100
Code Safety

Findings (7)

highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: exec

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred browser automation is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: Playwright

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred package bootstrap is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: npx clawhub@latest

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "scripts/setup.sh"

| `./scripts/setup.sh` | One-command local environment setup | Hours per new dev |

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
highPackage bootstrap execution detected (inside code block)-15

Found package bootstrap execution pattern: "npx clawhub@latest"

npx clawhub@latest install 10x-patterns

Surface package bootstrap commands for review. Ephemeral package execution and install-time dependency pulls increase supply-chain risk, especially when versions are not pinned or provenance is unclear.

behavioralASST-04
highContainer runtime control detected-15

Found container runtime control pattern: "Docker Compose"

| Environment setup | 2-5 hours (new devs) | Docker Compose, devcontainers, seed scripts |

Treat Docker or container-runtime control as privileged host access. Scope container operations tightly, avoid arbitrary daemon access, and require explicit approval before mutating local workloads.

behavioralASST-03
lowNo explicit safety boundaries-10

The skill does not include explicit safety boundaries defining what it should NOT do.

No safety boundary patterns found

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09