Bona Movie Production
v0.1.0Bona Movie Production is Bona Group's film-grade production skill. It covers image generation, image editing, and video generation, using Nano Banana 2 and N...
⭐ 0· 92·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description promise image generation, editing, and video generation using Nano Banana and Seedance models; the included Python client implements endpoints for image/video task creation and polling on create.bonanai.com and exposes the listed model/tool names. The requested BONA_API_KEY aligns with that purpose.
Instruction Scope
SKILL.md instructs setting BONA_API_KEY and running the provided Python script with model/tool flags; examples use remote image URLs and task creation/polling. There are no instructions to read unrelated local config, secret stores, or to send data to endpoints outside the bona domain.
Install Mechanism
No install spec; the skill is instruction+script only and relies on the requests Python package declared in SKILL.md. No downloads from untrusted URLs or archive extraction are present.
Credentials
Only BONA_API_KEY is required (and an optional TENCENT_VIDEO_TIMEOUT); that is proportionate for a client that must authenticate to a third-party API. No unrelated credentials or broad environment access is requested.
Persistence & Privilege
Skill is not always-enabled and does not request elevated or persistent system privileges. It does not modify other skills or system-wide config.
Assessment
This skill appears coherent: it will contact create.bonanai.com and requires a Bona API key. Before installing or running, verify the API key is from a trusted Bona service account, confirm create.bonanai.com is the expected provider, and avoid supplying unrelated or high-privilege credentials. Review the included Python script if you can, run it in a restricted environment if unsure, and rotate the API key if you later suspect misuse.Like a lobster shell, security has layers — review code before you run it.
latestvk97evr6k2wjktz5c7js80jj9td83f14a
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
