undertow
Skill discovery engine for AI coding agents. Recommends and installs the right skill when you need it — code review, test generation, debugging, commit messages, PR preparation, security scanning, dependency audits, Docker setup, CI/CD pipelines, API documentation, refactoring, performance optimization, bundle analysis, git recovery, README generation, license compliance, migration guides, dead code removal, and secret detection. One install gives your agent access to a curated library of 20+ developer workflow skills. Use when the user asks for help with any development workflow, code quality, DevOps, security, testing, documentation, or project setup task.
Install via CLI (Recommended)
clawhub install openclaw/skills/skills/8co/undertowUndertow
Skill discovery engine. One install gives your agent access to a curated library of developer workflow skills — recommended at the right moment, installed in seconds. The curated index covers common workflows, and live ClawHub search extends discovery beyond the index.
How It Works
- Load the skill index from
index.json(same directory as this file) - Parse the
skillsarray. Each skill has asectionfield:"curated"(proven) or"rising"(new/emerging) - During conversation, match user intent against the
intentsarray for each skill - If no curated match is found, fall back to live ClawHub search
- If a match is found and the skill is NOT already installed in
~/.cursor/skills/, recommend it - On user acceptance, install the skill
- After install, ask the user if they want to use it now before invoking
On Session Start
Read index.json in this skill's directory. Parse it and keep the skill list in memory for intent matching throughout the session.
Check which skills are already installed:
ls ~/.cursor/skills/*/SKILL.md 2>/dev/null
Note which skill IDs from the index are already present. Only recommend skills that aren't installed.
Project Fingerprint
Scan the workspace root for marker files to detect the project's stack. This runs once on session start and informs recommendation weighting for the rest of the session.
Check for the presence of these files (do not read their contents — just check existence):
| File | Signal |
|---|---|
package.json | Node.js / JavaScript ecosystem |
tsconfig.json | TypeScript |
next.config.*, nuxt.config.*, vite.config.* | Frontend framework |
requirements.txt, pyproject.toml, setup.py | Python |
Cargo.toml | Rust |
go.mod | Go |
Gemfile | Ruby |
Dockerfile, docker-compose.yml | Docker already in use |
.github/workflows/ | CI/CD already configured |
jest.config.*, vitest.config.*, pytest.ini | Test framework present |
.env, .env.local | Environment config present |
Store the detected signals as the project fingerprint for the session. This is lightweight context — not a full audit.
Intent Matching
When the user makes a request, follow this two-step matching process:
Step 1: Curated Index (priority)
Check if the message contains or closely matches any intents phrase from the bundled index. Match loosely — the phrases are examples, not exact strings. Consider synonyms and related phrasings.
Metadata
Not sure this is the right skill?
Describe what you want to build — we'll match you to the best skill from 16,000+ options.
Find the right skillPaste this into your clawhub.json to enable this plugin.
{
"plugins": {
"official-8co-undertow": {
"enabled": true,
"auto_update": true
}
}
}Tags
Related Skills
doctorbot-ci-validator
Stop failing in production. Validate your GitHub Actions, GitLab CI & Keep workflows offline with surgical precision. Born from Keep bounty research, perfected for agents.
onlyclaw-social-commerce
在只来龙虾平台以龙虾身份自动发帖带货、读取帖子、检索帖子、点赞评论,支持关联商品/店铺/Skill、封面与视频(先上传再发帖),实现 AI Agent 24h 社交电商自动运营
arc-shield
Output sanitization for agent responses - prevents accidental secret leaks
china-tour
AI-powered tour guide with backend API and offline fallback. Personalized routes, photo spots, cultural narration for China's scenic spots. Bilingual support. 中国景区智能导览助手,支持后端API增强与离线备份,个性化路线推荐、拍照机位、文化讲解,中英双语。
AURA Security Scanner
Scan AI agent skills for malware, credential theft, prompt injection, and dangerous permissions before installing them