Workshop Agenda Designer
v1.0.0把会议目标、参会人、时间与约束拆成可执行议程、分段脚本、产出物与会后跟进。;use for meeting, agenda, facilitation workflows;do not use for 预订会议室, 转写音频.
⭐ 0· 188·1 current·1 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (designing workshop agendas) align with the included files and script: resources/spec.json, template.md, examples, and scripts/run.py produce structured Markdown outputs and local audits. Required binary python3 is appropriate and proportional.
Instruction Scope
SKILL.md confines behavior to producing drafts and dry-run outputs and explicitly disallows calendar changes or sending invites. It instructs running the bundled script which reads files and directories supplied as input (file or directory). That is coherent for an audit/generation tool, but the script can read arbitrary files under any directory path the user/agent provides — avoid passing sensitive system directories or secrets-containing paths.
Install Mechanism
No install spec; instruction-only plus a local Python script. No external downloads, package installs, or non-standard install locations are used.
Credentials
No environment variables, credentials, or config paths are requested. The tool only needs python3 and local filesystem read access to the user-provided input — proportional to its purpose.
Persistence & Privilege
always is false and the skill does not request permanent agent presence or modify other skills. The script writes output only if asked ( --output ), and SKILL.md emphasizes dry-run/read-only modes.
Assessment
This skill appears coherent and low-risk: it runs a local Python script that generates structured workshop agendas or audits a directory you point it at. Before running, confirm you (or an automated agent) will only pass intended input paths — do not give it root/ home/ application config directories that may contain secrets. Because the script can read any files under an input directory, treat it like any local tool that has read access: review inputs for sensitive data and run in a controlled environment if needed. No external network calls or secret exfiltration mechanisms were found in the bundle.Like a lobster shell, security has layers — review code before you run it.
latestvk970yg3y6n9292g4ys0a2r9dvd83fdba
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧭 Clawdis
OSmacOS · Linux · Windows
Binspython3
