Visual Prompt Engine
Analysis
This skill appears benign: it generates image prompts using local reference data and optional Dribbble collection, with disclosed local history and optional automation to notice.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill. Code file presence: 2 code file(s)
The registry context provides limited provenance while the skill includes runnable helper scripts. This is a provenance note, not evidence of malicious behavior.
Browse `https://dribbble.com/shots/popular` with a browser tool (Camofox, Playwright, etc.)... Alternative: RSS/HTML (may be blocked by WAF)
The skill may direct the agent to use browser or scraping tools to collect public design references. This is central to the skill's purpose, but it involves third-party web access and should remain user-directed.
Automation (Optional) Set up a daily cron to refresh visual references
The documentation describes optional recurring refresh automation. It is not installed automatically in the artifacts, but enabling it would create ongoing background activity.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Check against recent prompts in `data/prompt_history.json` to prevent repetition; Append the new prompt to history
The skill keeps a local prompt history and reuses it across future prompt-generation tasks. This is disclosed and purpose-aligned for deduplication, but it is persistent context.
