技能详情(站内镜像,无评论)
作者:Daniel Lummis @daniellummis
许可证:MIT-0
MIT-0 ·免费使用、修改和重新分发。无需归因。
版本:v1.1.0
统计:⭐ 0 · 155 · 0 current installs · 0 all-time installs
⭐ 0
安装量(当前) 0
🛡 VirusTotal :良性 · OpenClaw :良性
Package:daniellummis/github-actions-run-gap-audit
安全扫描(ClawHub)
- VirusTotal :良性
- OpenClaw :良性
OpenClaw 评估
The skill is internally consistent with its stated purpose (local analysis of exported GitHub Actions run JSON files) and does not request credentials or perform network activity itself, with one small mismatch in documentation about the required CLI.
目的
The skill's name/description (detecting stale GitHub Actions runs) matches what the bundled script and fixtures do: parse run JSON files, compute cadence statistics, and emit a report. One minor inconsistency: SKILL.md shows using the 'gh' CLI to export runs (gh run view ...) but 'gh' is not listed among required binaries. Either the user must supply those exports themselves (which is reasonable) or the skill should declare 'gh' as a required …
说明范围
SKILL.md and scripts instruct the agent/user to read local JSON files (RUN_GLOB) and run the audit; the Python code only parses files, computes statistics, and prints text/JSON. There are no commands or instructions to read unrelated system files, call external servers, or exfiltrate data. The examples do show using 'gh' to collect data, which involves network access when the user runs that step, but that is external to the audit script itself.
安装机制
There is no install spec (instruction-only plus an included script). Nothing is downloaded or executed from external URLs during install. The runtime requires bash and python3 (declared), which are proportionate for running the included script.
证书
The skill requires no credentials or config paths. It accepts many optional environment inputs (globs, regex filters, numeric thresholds) which are reasonable for a configurable audit tool; none are named like SECRET/TOKEN or otherwise request sensitive credentials.
持久
always is false and the skill does not request persistent system-level presence or modify other skills. It does not attempt to enable itself or write persistent credentials.
综合结论
This skill is coherent and appears to do only local analysis of exported GitHub Actions run JSON files. Before installing/using it: (1) confirm you have bash and python3 available; (2) if you plan to follow the SKILL.md example that uses 'gh run view', make sure you have the GitHub CLI installed and authenticated — the script itself does not call 'gh' and 'gh' is not declared as a required binary; (3) run the audit against the included fixture…
安装(复制给龙虾 AI)
将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。
请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「GitHub Actions Run Gap Audit」。简介:Detect GitHub Actions workflow groups that stopped running on their normal cade…。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/daniellummis/github-actions-run-gap-audit/SKILL.md
(来源:yingzhi8.cn 技能库)
SKILL.md
---
name: github-actions-run-gap-audit
description: Detect GitHub Actions workflow groups that stopped running on their normal cadence using median run intervals and current inactivity gap.
version: 1.1.0
metadata: {"openclaw":{"requires":{"bins":["bash","python3"]}}}
---
# GitHub Actions Run Gap Audit
Use this skill to detect workflow groups that have gone unexpectedly quiet (stale triggers, broken schedules, disabled automation, branch drift).
## What this skill does
- Reads GitHub Actions run JSON exports
- Groups by repository + workflow + branch + event
- Computes historical cadence (median and p90 interval hours)
- Compares latest inactivity gap vs historical cadence
- Scores risk severity (`ok`, `warn`, `critical`)
- Emits text or JSON for CI checks and automation guardrails
## Inputs
Optional:
- `RUN_GLOB` (default: `artifacts/github-actions/*.json`)
- `TOP_N` (default: `20`)
- `OUTPUT_FORMAT` (`text` or `json`, default: `text`)
- `MIN_RUNS` (default: `4`)
- `WARN_GAP_MULTIPLIER` (default: `2.0`)
- `CRITICAL_GAP_MULTIPLIER` (default: `3.5`)
- `MIN_WARN_GAP_HOURS` (default: `12`)
- `MIN_CRITICAL_GAP_HOURS` (default: `24`)
- `WORKFLOW_MATCH` (regex, optional)
- `WORKFLOW_EXCLUDE` (regex, optional)
- `BRANCH_MATCH` (regex, optional)
- `BRANCH_EXCLUDE` (regex, optional)
- `EVENT_MATCH` (regex, optional)
- `EVENT_EXCLUDE` (regex, optional)
- `REPO_MATCH` (regex, optional)
- `REPO_EXCLUDE` (regex, optional)
- `RUN_ID_MATCH` (regex, optional)
- `RUN_ID_EXCLUDE` (regex, optional)
- `RUN_URL_MATCH` (regex, optional)
- `RUN_URL_EXCLUDE` (regex, optional)
- `NOW_ISO` (optional fixed evaluation time for deterministic CI tests)
- `FAIL_ON_CRITICAL` (`0` or `1`, default: `0`)
## Collect run JSON
```bash
gh run view <run-id> --json databaseId,workflowName,event,conclusion,headBranch,headSha,createdAt,updatedAt,startedAt,url,repository
> artifacts/github-actions/run-<run-id>.json
```
## Run
Text report:
```bash
RUN_GLOB='artifacts/github-actions/*.json'
MIN_RUNS=5
WARN_GAP_MULTIPLIER=2.25
bash skills/github-actions-run-gap-audit/scripts/run-gap-audit.sh
```
JSON output with fail gate:
```bash
RUN_GLOB='artifacts/github-actions/*.json'
OUTPUT_FORMAT=json
FAIL_ON_CRITICAL=1
bash skills/github-actions-run-gap-audit/scripts/run-gap-audit.sh
```
Targeted run-scope triage:
```bash
RUN_GLOB='artifacts/github-actions/*.json'
RUN_ID_MATCH='^(88|89)'
RUN_URL_EXCLUDE='rerun'
OUTPUT_FORMAT=json
bash skills/github-actions-run-gap-audit/scripts/run-gap-audit.sh
```
Run with bundled fixtures:
```bash
RUN_GLOB='skills/github-actions-run-gap-audit/fixtures/*.json'
NOW_ISO='2026-03-07T00:00:00Z'
bash skills/github-actions-run-gap-audit/scripts/run-gap-audit.sh
```
## Output contract
- Exit `0` in report mode (default)
- Exit `1` when `FAIL_ON_CRITICAL=1` and one or more groups are critical
- Text mode prints summary + ranked stale workflow groups
- JSON mode prints summary + ranked groups + critical group details