digital-human-training
v1.0.0数字人训练与部署 Skill - 提供从语音克隆、唇形同步到实时交互数字人的全流程训练建议与技术支持。
⭐ 1· 372·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description match the SKILL.md content: it is a how-to for building voice-cloned, lip-synced digital humans. However, the instructions reference cloud services and third-party tools (e.g., HeyGen streaming API, private model deployments) without declaring how API keys or downloads are expected to be supplied — this is plausible for an instruction-only skill but worth noting.
Instruction Scope
The SKILL.md stays on-topic (collect audio/video samples, select models, wire up Whisper/TTS/LLM/Wav2Lip). It explicitly instructs collecting user voice/video samples (sensitive personal data). It does not direct the agent to read unrelated system files, environment variables, or exfiltrate data to hidden endpoints.
Install Mechanism
There is no install spec and no code files; this reduces risk because nothing is automatically written to disk or fetched by the skill. The guidance does recommend using external projects/tools, but those are not installed by the skill itself.
Credentials
The skill declares no required environment variables or credentials. That is consistent with being instruction-only, but some recommended integrations (cloud APIs like HeyGen or model-hosting services) would typically require API keys — the skill does not request them or explain credential handling, so the user must supply and manage those outside the skill.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or attempt to modify other skills or system settings. Autonomous model invocation is allowed by default (normal) and there are no extra privilege requests.
Assessment
This skill is a how-to for building voice-cloned, lip-synced digital humans and appears internally consistent, but it handles highly sensitive media and refers to third-party/cloud services. Before using: (1) Ensure you have clear consent from any person whose voice/video will be used; (2) Source models and binaries from trusted repositories (avoid unknown downloads); (3) Keep API keys and cloud credentials private — the skill doesn't manage them, so provide them only to trusted integrations and never paste secrets into public channels; (4) Prefer local processing for high-risk content when feasible; (5) Confirm licenses and terms for third-party tools (e.g., HeyGen, Wav2Lip, SoVITS) and verify data-retention policies if using hosted APIs. If you want a stronger safety assessment, provide any external install scripts or a list of exact third-party endpoints/APIs you plan to integrate so those can be evaluated for coherence and risk.Like a lobster shell, security has layers — review code before you run it.
latestvk9741fs5w5xxgchh2cha3pccms823xeb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
