Workplace Safety Compliance

v1.0.0

Generate workplace safety audits, incident reports, hazard assessments, training matrices, and compliance programs aligned with OSHA standards.

1· 652·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the SKILL.md: it produces audits, incident reports, JHAs, training matrices, and OSHA-mapped checklists. It declares no binaries, env vars, or installs — which is appropriate for a template/authoring skill.
Instruction Scope
SKILL.md directs the agent to ask the user for industry/context and then generate structured documents (hazard matrices, checklists, action plans). It does not instruct reading system files, pulling other credentials, or posting data to external endpoints.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes on-disk code execution risk.
Credentials
No environment variables, credentials, or config paths are required. The requested surface is proportionate to a content-generation/templating skill.
Persistence & Privilege
always is false and the skill does not request permanent presence or elevated privileges. Autonomous invocation is the platform default but is not combined here with broad access.
Assessment
This skill appears coherent and low-risk because it is instruction-only and asks for no credentials. Before installing: (1) Verify the publisher/source if you require vendor accountability — the SKILL.md/README reference AfrexAI but the registry 'source' is unknown. (2) Do not paste sensitive PII or protected health information into the agent when generating incident reports; redact or anonymize real data. (3) Treat generated compliance text as drafting assistance, not legal or certified safety advice — have an OSHA/safety professional review before relying on it. (4) If you plan to integrate outputs into downstream systems, confirm the agent will not transmit data to external endpoints you don't control. (5) Test with fictional/example data first to validate formats and accuracy.

Like a lobster shell, security has layers — review code before you run it.

OSHAvk971bp936psxhke64khtz9y3v5817a24compliancevk971bp936psxhke64khtz9y3v5817a24hazardvk971bp936psxhke64khtz9y3v5817a24latestvk971bp936psxhke64khtz9y3v5817a24safetyvk971bp936psxhke64khtz9y3v5817a24workplacevk971bp936psxhke64khtz9y3v5817a24

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments