Image Studio — AI Image Prompt System

v1.0.0

Generate professional AI image prompts for any platform and niche — Instagram, LinkedIn, blog headers, YouTube thumbnails, brand visuals, and ads. Works with...

1· 561·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (AI image prompt generation for multiple platforms) match the SKILL.md content: prompt formulas, templates, and platform sizing specs. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
SKILL.md contains only prompt templates, style guides, and platform specs. It does not instruct the agent to read local files, access environment variables, call external endpoints, or transmit data outside the normal agent flow.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing is downloaded or written to disk by the skill itself, which minimizes install-time risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. Its functionality (prompt generation) does not require secret access, so the lack of requested credentials is proportionate.
Persistence & Privilege
always is false and there is no special persistent configuration. The skill can be invoked by the model (platform default) but it does not request elevated privileges or system-wide changes.
Assessment
This skill appears internally consistent and low-risk because it is purely an instruction file for generating image prompts and asks for no credentials or installs. Before using outputs in production, review generated prompts/images for PII, trademarked or copyrighted characters, and platform policy compliance (copyright/AI content rules). If a future version requests API keys, downloads code, or instructs the agent to access files or external endpoints, treat it as suspicious and re-evaluate before installing or granting access.

Like a lobster shell, security has layers — review code before you run it.

contentvk9736gnp5hkjwfpf2fwx4ssrp581wze8latestvk9736gnp5hkjwfpf2fwx4ssrp581wze8marketingvk9736gnp5hkjwfpf2fwx4ssrp581wze8social-mediavk9736gnp5hkjwfpf2fwx4ssrp581wze8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments