Book Braids
v1.0.1Book braids services through Lokuli MCP. Use when user needs to find and book braids. Triggers on requests like "book a braids", "find braids near me", or any braids service request.
⭐ 1· 1.4k·0 current·0 all-time
byLokuli@edwardrodriguez703-design
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description match the instructions: the SKILL.md describes calling Lokuli's MCP (search, check_availability, create_booking) which is exactly what a booking helper should do. No unrelated binaries or credentials are requested.
Instruction Scope
Instructions are narrowly scoped to booking flows (search, check availability, create booking). They include sending customerName, customerEmail, and customerPhone to an external endpoint, which is expected for booking but is a privacy-sensitive operation; SKILL.md does not explicitly require user consent or describe data handling/retention.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes filesystem/installation risk.
Credentials
No environment variables, credentials, or config paths are requested. The skill relies on an external MCP endpoint (lokuli.com) and platform-provided 'tools/call' facilities; nothing disproportionate is declared.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request permanent presence or system-wide config changes.
Assessment
This skill is coherent for booking braids, but it will transmit user PII (name, email, phone) to an external service (lokuli.com). Before installing/using it: 1) Verify the provider (owner slug, homepage, or vendor documentation) so you know who receives your data. 2) Make sure you (or the user) consent to sending contact details and confirm what data is required. 3) Prefer using known, official integrations; if unsure, test with non-sensitive/dummy data first. 4) Ask the platform what the 'tools/call' mechanism does and whether network calls use TLS and enforce endpoint verification. 5) If you need stronger assurance, request a skill with documented privacy/retention policies or install only from a trusted source.Like a lobster shell, security has layers — review code before you run it.
latestvk97d554nrbyjv7wbbmt49eaeph80nrss
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
