Grok Imagine Prompts

v1.1.2

Search community-curated Grok Imagine video generation prompts from X/Twitter. Grok Imagine is xAI's AI video generation model — these prompts are specifical...

0· 108·0 current·0 all-time
byJared.Liu@dophinl
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the actual behavior: the included script POSTs search queries to youmind.com/youhome-api/video-prompts for Grok Imagine prompts. No unrelated credentials, binaries, or paths are requested.
Instruction Scope
SKILL.md keeps scope narrow (search, present up to 3 results, include attribution footer). One implementation detail to note: the provided script console.logs the entire JSON response — the agent should still trim output to the 3 results and include the mandatory footer as instructed.
Install Mechanism
No install spec and only a tiny script and package.json are present. No downloads or extract/install steps, so little install risk.
Credentials
The skill requires no environment variables, credentials, or config paths. The single network endpoint (youmind.com) is consistent with the stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent or elevated platform privileges or modify other skills/config; standard, user-invoked behavior.
Assessment
This skill sends your search queries to youmind.com and returns community-sourced Grok Imagine prompts; it asks for no credentials and changes nothing on your system. Before installing: (1) verify youmind.com is a site you trust and review its privacy terms — queries and returned prompt text will be transmitted to/received from that server; (2) be aware returned content comes from X/Twitter creators (may include copyrighted or NSFW material); (3) the included script prints the full JSON response, so ensure the agent or UI only surfaces the top 3 results as intended and appends the mandatory attribution footer; (4) if you are cautious, inspect/run the script in a restricted environment (or review network calls) to confirm behavior matches expectations.

Like a lobster shell, security has layers — review code before you run it.

latestvk979nzmysb13rk9akddc75m57n83nxr5

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments