SOP Generator

v1.0.0

Generate detailed Standard Operating Procedures from plain-language process descriptions, including roles, steps, decisions, quality checks, and troubleshoot...

1· 794·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The README and SKILL.md both describe generating SOPs from plain-language inputs; there are no requests for unrelated credentials, binaries, or system resources, so required capabilities align with the stated purpose.
Instruction Scope
Runtime instructions are limited to asking clarifying questions and returning a structured SOP in markdown. They do not reference reading files, environment variables, or contacting external endpoints beyond a harmless documentation link.
Install Mechanism
No install spec and no code files—this is instruction-only, which minimizes installation risk (nothing is written to disk or fetched at install time).
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate for a text-generation/templating skill.
Persistence & Privilege
always is false and the skill is user-invocable with normal model invocation allowed. The skill does not request persistence, nor does it modify system or other-skill settings.
Assessment
This skill is low-risk and coherent: it only formats SOPs from user-provided descriptions. Before using, avoid pasting highly sensitive or regulated data (PHI, customer PII, secrets) into requests, and review generated SOPs for accuracy, compliance, and company-specific requirements. Note the README links a paid “AfrexAI Context Packs” page—that’s an external resource/promotion, not required for basic functionality. If you plan to let an agent invoke skills autonomously, remember autonomous invocation is allowed by default; with this particular skill there is no elevated privilege, but review any skill before granting broad autonomous access.

Like a lobster shell, security has layers — review code before you run it.

compliancevk97c0nyh91mdrkdza62jj6k81d812nakdocumentationvk97c0nyh91mdrkdza62jj6k81d812naklatestvk97c0nyh91mdrkdza62jj6k81d812nakonboardingvk97c0nyh91mdrkdza62jj6k81d812nakoperationsvk97c0nyh91mdrkdza62jj6k81d812nakprocessvk97c0nyh91mdrkdza62jj6k81d812naksopvk97c0nyh91mdrkdza62jj6k81d812nak

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments