Webinar Repurpose Studio

v1.0.0

把 webinar 内容拆成回放介绍、短文案、社媒提纲、FAQ 和后续邮件。;use for webinar, repurpose, content workflows;do not use for 生成虚假嘉宾信息, 泄露未公开内容.

0· 69·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md, resources/spec.json, template, and scripts/run.py all align: the tool ingests webinar/content text (or files) and produces structured Markdown output. Requiring only python3 is appropriate.
Instruction Scope
SKILL.md keeps scope to content repurposing and explicitly warns about not fabricating facts. It suggests running the included local script via shell/exec; that script reads input files or directories and can perform directory/csv/pattern audits. Reading user-supplied files is expected for this use case, but care is needed to avoid pointing it at sensitive system files.
Install Mechanism
No install spec — instruction-only plus a local Python script. No downloads or external package installs are performed by the bundle.
Credentials
No environment variables, credentials, or config paths are requested. The script uses only Python standard library and local resources included in the package.
Persistence & Privilege
always is false and the skill does not request persistent/system-wide changes or modify other skills. It runs locally when invoked.
Assessment
This skill appears to do what it says: it formats webinar input into a structured brief using an included local Python script. Before running: (1) review inputs and avoid passing sensitive system files or entire home directories to the --input argument (the script can read arbitrary files if you point it at them); (2) prefer running the script on sanitized/example inputs or using the --dry-run option; (3) the bundle does not perform network activity or ask for credentials, but always inspect outputs before publishing externally; (4) if you plan to allow an autonomous agent to invoke this skill, restrict the agent's ability to choose arbitrary filesystem paths to prevent accidental disclosure of unrelated local files.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cbq4n1c5b2wr3bgpekykjmn83erwh

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🎥 Clawdis
OSmacOS · Linux · Windows
Binspython3

Comments