Event Planner Pro
v1.0.0Plan, execute, and measure business events — conferences, webinars, workshops, product launches, networking events, trade shows, and corporate gatherings. Co...
⭐ 1· 412·0 current·0 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md content: templates, budgets, timelines, vendor/speaker guidance and ROI frameworks. It requests no credentials, binaries, or config paths that would be unrelated to event planning.
Instruction Scope
SKILL.md contains prose, YAML templates and step-by-step planning guidance only. It does not instruct the agent to read system files, access environment variables, execute commands, or transmit data to unexpected endpoints.
Install Mechanism
No install spec or code is included (instruction-only). Nothing would be downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths — which is appropriate for a planning/playbook skill.
Persistence & Privilege
always is false and the skill is user-invocable; autonomous invocation remains allowed (platform default) but the skill does not request elevated or permanent system privileges.
Assessment
This is an instruction-only event-planning playbook and appears internally coherent. A few practical notes before installing: (1) Source/homepage are minimal — the README points to an AfrexAI GitHub pages URL and an owner ID; if provenance matters, verify the publisher before enabling the skill, especially for autonomous use. (2) The README advertises paid “Context Packs”; the skill itself does not handle payments, but follow external links cautiously. (3) Do not paste sensitive attendee data, credentials, or PII into conversations with the skill unless you trust the publisher and have reviewed how your agent handles data. (4) Because the skill can be invoked autonomously (platform default), review any autogenerated emails, outreach templates, or outbound content before sending. Overall: functionally consistent and low risk, but verify publisher reputation if you require strict supply-chain assurance.Like a lobster shell, security has layers — review code before you run it.
conferencevk974a4vm14c2ajbej3hyv28h3s81rdfneventvk974a4vm14c2ajbej3hyv28h3s81rdfnlatestvk974a4vm14c2ajbej3hyv28h3s81rdfnmarketingvk974a4vm14c2ajbej3hyv28h3s81rdfnplanningvk974a4vm14c2ajbej3hyv28h3s81rdfnwebinarvk974a4vm14c2ajbej3hyv28h3s81rdfnworkshopvk974a4vm14c2ajbej3hyv28h3s81rdfn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🎪 Clawdis
OSLinux · macOS · Windows
