Meeting Intelligence

v1.0.0

AI-powered meeting tool that summarizes discussions, extracts prioritized action items with owners and deadlines, and drafts clear follow-up emails.

0· 51·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description align with the SKILL.md. All declared capabilities (summaries, action items, follow-ups) are reflected in the instructions; there are no unexpected required binaries, env vars, or config paths.
Instruction Scope
Runtime instructions are limited to analyzing provided transcripts/text, extracting items, and formatting emails. They do not direct the agent to read unrelated files, access system-wide credentials, or transmit data to external endpoints.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or fetched during install.
Credentials
The skill requests no environment variables, credentials, or config paths. The guidance about maintaining context across sessions mentions shared history conceptually but does not demand access to external secrets or services.
Persistence & Privilege
Flags show normal defaults (always:false, agent invocation allowed). The skill does not request permanent presence or modify other skills or agent-wide configs.
Assessment
This skill appears coherent and instruction-only, but consider privacy and operational questions before enabling it: transcripts often contain sensitive information (PII, legal, financial, or secrets), and the skill will expose whatever you give it in generated summaries and emails. Confirm where transcripts come from and who can see the outputs; avoid pasting credentials or secrets into meeting text. Because the skill can be invoked autonomously by the agent, ensure your agent's invocation policy and data-retention rules match your privacy needs. Finally, if you plan to share or store generated summaries, check access controls and retention/archival policies so meeting content isn't inadvertently overexposed.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bk5a2pkf5g1x284d2yswf6983pj5x

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments