Training And Nutrition Coach
v1.0.0Create beginner-friendly workout plans, calorie and macro estimates, meal structures, food plans, and fitness-oriented recipe suggestions. Use when a user as...
⭐ 0· 168·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description, SKILL.md, reference docs, and the included calc_macros.py all align: they support calorie/macro estimation, meal plans, and beginner workout programming. Nothing requests unrelated capabilities (cloud credentials, external services, or privileged system access).
Instruction Scope
Runtime instructions restrict behavior to reading bundled reference files and using the local calc_macros.py for estimates. The SKILL.md explicitly limits scope (no medical diagnosis, ask grouped follow-ups) and does not direct collection or transmission of unrelated system data.
Install Mechanism
No install spec — instruction-only with a small local Python script. There are no downloads, external installers, or archive extraction steps.
Credentials
No environment variables, credentials, or config paths are required. The single script takes command-line args only and does not read secrets or external configs.
Persistence & Privilege
Skill is not always-enabled and does not request elevated or persistent agent privileges or modify other skills. Default autonomous invocation is unchanged and appropriate for this type of skill.
Assessment
This skill is coherent and low-risk: it uses local heuristics and a small Python script to estimate calories/macros and provides meal/workout templates. It does not contact external services or ask for credentials. Remember it is not medical advice — review any plan with a clinician if you have medical conditions or injuries. If you plan to run the included script in a sensitive environment, you can inspect its source (it's short, uses only argparse and math) before use; note its rounding choices (50 kcal and 5 g increments) and default assumptions when inputs are omitted.Like a lobster shell, security has layers — review code before you run it.
latestvk974twvpsrngh4j0kzccen8qn5831h13
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
