apple-notes-formatting

v1.0.0

Use when the user wants to beautify, restructure, or rewrite content into an Apple Notes-friendly note, especially article summaries, knowledge cards, topic...

0· 52·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the runtime instructions and included style guide. The skill is purely about restructuring and marking up text for Apple Notes and requests no unrelated credentials, binaries, or system access.
Instruction Scope
SKILL.md confines behavior to asking for user content, applying Apple Notes–style structure, and referencing the included style guide. It does not instruct reading unrelated files, accessing environment variables, or contacting external endpoints.
Install Mechanism
No install spec and no shipped executables or scripts — instruction-only skill, so nothing is written to disk or downloaded during installation.
Credentials
No environment variables, credentials, or config paths are required; requested capabilities are minimal and appropriate for a formatting helper.
Persistence & Privilege
Skill is not marked always:true, has no special system privileges, and does not modify other skills or system-wide config. It is user-invocable and can be invoked autonomously by agents (platform default).
Assessment
This skill is an instruction-only formatter for turning user-provided text into Apple Notes–friendly output and does not request credentials or install code. Before using, consider: (1) any content you paste will be processed by the agent/LLM—avoid submitting secrets or highly sensitive material; (2) review the formatted output before pasting into Apple Notes to ensure no accidental disclosure; (3) if you prefer the skill not run autonomously, keep it user-invocable only or adjust agent settings to prevent automatic invocation. Otherwise it is coherent and proportionate to its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bwmdd49jaj7f44wkp2an4gh84rwak

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments