Prototype
v3.4.1Build interactive HTML prototypes. Use when creating clickable mockups, adding animations, linking pages, or exporting HTML.
⭐ 0· 322·0 current·0 all-time
byBytesAgain2@ckchzh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (interactive HTML prototypes) aligns with the included script and commands (create, component, animate, link, preview, export). The only declared requirement is bash 4+, which is appropriate for a shell script-based tool.
Instruction Scope
SKILL.md tells the agent to run scripts/script.sh with explicit commands and options. The script generates and updates HTML/CSS/JS files and prints previews; it does not request reading unrelated system files or contacting external endpoints. Note: the script writes files to user-specified output paths and reads prototype input directories (for preview/export), so pointing it at sensitive system paths could overwrite or expose files — this is expected behavior for a file generator but worth caution.
Install Mechanism
No install specification is provided (instruction-only with a bundled script). Nothing is downloaded or written to disk beyond the included script when the skill is installed; execution happens when the agent runs the script. This is low-risk compared to remote installs.
Credentials
The skill does not request environment variables, credentials, or config paths. The script does not appear to read secrets or external tokens, which fits the stated purpose.
Persistence & Privilege
always: false and no special persistence or modification of other skills or agent configuration are requested. The skill can be invoked by the model (normal default) but does not demand elevated or permanent privileges.
Assessment
This skill appears coherent and implements what it advertises: a bash-based HTML prototype generator. Before running or allowing autonomous execution, review scripts/script.sh yourself and avoid pointing the tool at system or sensitive directories (e.g., /etc, your home with secrets) because it will create and overwrite files in the output/input paths you supply. If you want extra safety, run the commands in a sandboxed workspace or container and do not run them with elevated privileges.Like a lobster shell, security has layers — review code before you run it.
latestvk971k7jc7hd10jsaym69v3gap5832vpm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
