Z Image API

v1.0.0

Use PoYo AI Z-Image for straightforward prompt-based image generation through the `https://api.poyo.ai/api/generate/submit` endpoint. Use when a user wants d...

0· 216·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, required binary (curl), required env var (POYO_API_KEY), referenced endpoints, and example payloads all match a text-to-image submission use case.
Instruction Scope
SKILL.md and references only instruct building/submitting JSON to api.poyo.ai and polling for task status or using webhook callbacks. They do not request unrelated files, system config, or other credentials.
Install Mechanism
Instruction-only skill with a small helper shell script; no install spec or external download. Lowest-risk delivery (no archives or package installs).
Credentials
Only POYO_API_KEY is required which is consistent with the API usage. Note: the provided script accepts the API key as a command-line argument which can expose the key via process listings or shell history—prefer setting POYO_API_KEY in the environment rather than passing it as an arg. Also be mindful when using callback_url (webhook) to avoid exposing sensitive results to untrusted endpoints.
Persistence & Privilege
Skill does not request persistent or elevated platform privileges (always: false). It does not modify other skill configs or require system-wide changes.
Assessment
This skill appears coherent for submitting image-generation jobs to PoYo. Before installing: 1) Only provide a PoYo API key (POYO_API_KEY) and avoid passing it on the command line (use environment variable) to reduce leakage via process lists or shell history. 2) Confirm you trust the poyo.ai service and dashboard used to create the key. 3) If you use callback_url/webhooks, ensure the receiving endpoint is under your control and uses HTTPS, because results (and potentially generated content or identifiers) will be posted there. 4) Monitor your API key usage and consider scoping or rotating the key if PoYo supports it. Overall the skill is consistent with its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk970akvkr03dwg3m3q4fd3s6vs82qw2f

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binscurl
EnvPOYO_API_KEY
Primary envPOYO_API_KEY

Comments