Gemini Watermark
v2.1.0Remove visible Gemini AI watermarks from images via reverse alpha blending. Use for cleaning Gemini-generated images, removing the star/sparkle logo watermar...
⭐ 0· 328·1 current·1 all-time
by@h1bomb
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (remove Gemini AI visible watermark) match the delivered code and docs. The included Python script implements reverse alpha blending and detection, and no unrelated binaries, credentials, or services are requested.
Instruction Scope
SKILL.md instructs only local image processing, dependency installation (Pillow, numpy), and optional local alpha-map use. Runtime instructions do not ask the agent to read unrelated system files, environment variables, or to contact external endpoints.
Install Mechanism
No install spec is provided (instruction-only install). The runtime is pure Python with standard PyPI dependencies; no downloads from untrusted URLs or extracted archives are performed by the skill itself.
Credentials
The skill declares no required environment variables, config paths, or credentials and the code does not access environment secrets. Dependency requirements (Pillow, numpy) are proportionate to image processing.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes or modify other skills. It only reads input files, optional local alpha maps, and writes output images to user-specified paths.
Assessment
This skill appears internally consistent and purely offline, but consider these practical points before installing: (1) review the included Python file yourself or run it in a sandbox before processing sensitive systems; (2) install Pillow and numpy from PyPI and keep package sources trusted; (3) operate on copies of images (the tool writes outputs and can overwrite if directed); (4) removing visible watermarks may violate terms of use, copyright, or platform policies—ensure you have rights to modify the images; (5) if you need stronger assurance, run the script in an isolated environment (container/VM) and inspect the code for any modifications before using it on bulk or sensitive data.Like a lobster shell, security has layers — review code before you run it.
latestvk97edf94vmvr136fn7kp3wy3y58219np
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
