Nansi website and web app builder
v1.0.3Build stunning websites, landing pages, portfolios, and web apps by chatting with Nansi on WhatsApp. A no-code, mobile-first AI website builder — just descri...
⭐ 2· 556·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (WhatsApp-based website builder) match the runtime instructions (send messages to +233540311706 and relay responses). The skill does not request unrelated credentials or binaries.
Instruction Scope
Instructions stay within the stated purpose (gather site details, ask consent, send messages and relay the preview URL). However, the procedure allows the agent to transmit attachments (images, voice notes) and to answer follow-up questions on the user's behalf; this creates a risk of unintentionally sharing extra or sensitive information unless the user is explicit. The skill promises to ask consent before the first message, but later follow-ups may require re-confirmation for additional data or attachments.
Install Mechanism
Instruction-only skill with no install step or downloaded code, so nothing is written to disk and there is no install-time risk.
Credentials
No environment variables, credentials, or config paths are requested. The instructions assume the platform can send WhatsApp messages but do not ask for WhatsApp API tokens — that is reasonable for an instruction-only skill, though the platform must provide the messaging capability.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes or elevated privileges. It does not attempt to modify other skills or system config.
Assessment
This skill is coherent with its purpose, but remember it will transmit anything you explicitly provide to an external WhatsApp number (+233540311706). Before proceeding: (1) confirm you consent to sending the business details; (2) avoid sharing passwords, financial data, or personally identifying information you don't want sent; (3) be cautious when sending images or voice notes — they could contain sensitive data; (4) verify the service (look for a privacy policy, terms, or a legitimate website) if you plan to use it for real business data; (5) if the agent will answer follow-up questions on your behalf, require explicit confirmation from you before sending any additional or new information.Like a lobster shell, security has layers — review code before you run it.
latestvk97eksqh17xqxkb1448eapfmnx81qnbk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
