Safe Deposit Box Index

Build a printable safe deposit box inventory and access instruction sheet from user-provided item lists, photos, owner notes, and bank rules while masking account numbers and avoiding secret sharing.

Audits

Pass

Install

openclaw skills install safe-deposit-box-index

Safe Deposit Box Index Card

Overview

Use this skill when a user wants a clear, printable record of what is stored in a safe deposit box and how authorized people can find needed information.

This is a prompt-only household administration skill. It organizes user-provided item descriptions, photos described by the user, ownership notes, document dates, and access rules. It does not request or store secrets, reveal full account numbers, give legal or financial advice, contact banks, open accounts, or manage access.

Trigger

Use this skill when the user asks to:

  • Create an inventory of safe deposit box contents.
  • Turn photos or notes into a printable box index.
  • List important documents, valuables, keys, proofs, policies, deeds, titles, certificates, or heirlooms.
  • Prepare an access instruction sheet for authorized contacts.
  • Mask sensitive numbers in an inventory before sharing or printing.
  • Separate what is in the box from what should not be stored there.

Do not use this skill to share secrets, publish access details, bypass bank access rules, give estate planning advice, or decide who should receive access.

Intake

Ask for only the details needed to build the index:

  • Box nickname or location label, without full branch address if privacy is a concern.
  • User-provided item list or photo descriptions.
  • Item category, short description, owner, date, and condition if known.
  • Whether proof photos exist and where the user keeps them, without requesting uploads if not needed.
  • Bank access rules supplied by the user, such as authorized signers, keys required, ID rules, hours, or appointment needs.
  • Contacts or roles to mention, such as executor, spouse, sibling, attorney, or trusted contact, if the user chooses.
  • Preferred format: compact card, full inventory, sharing-safe copy, or emergency handoff sheet.

Do not ask for PINs, passwords, full account numbers, full Social Security numbers, key codes, alarm codes, seed phrases, private keys, or other secrets.

Workflow

  1. Collect user-provided inventory. Work only from the user's list, notes, and described photos.
  2. Classify each item. Group contents as identity documents, property records, financial records, insurance, legal documents, family records, valuables, keys, digital asset references, or miscellaneous.
  3. Mask sensitive identifiers. Replace account, policy, tax, government ID, and certificate numbers with safe partial forms such as ending in 1234 or last 4 only.
  4. Record proof locations. Note whether a photo, scan, receipt, appraisal, or copy exists and where the user says it is kept, using non-secret labels.
  5. Summarize access rules. Capture only user-supplied bank and household access instructions. Mark anything uncertain for verification with the bank or professional adviser.
  6. Identify gaps. Flag unknown owners, missing dates, expired documents, unphotographed items, unclear beneficiaries, outdated contacts, or items that may need professional review.
  7. Create share levels. Separate a private master inventory from a safer share copy with masked details and no secrets.
  8. Build the printable card. Produce a concise inventory table and an access instruction sheet.
  9. End with privacy notes. Remind the user not to share secrets and to confirm legal or bank access rules with official sources.

Output Format

Return these sections:

  1. Index Snapshot: box label, date basis, source notes supplied, intended audience, and privacy level.
  2. Printable Inventory: item number, category, description, owner, date, proof location, status, and notes.
  3. Sensitive Details Masking Log: fields masked, format used, and items needing safer handling.
  4. Access Instruction Sheet: authorized roles, key or ID requirements, bank rules supplied by user, appointment notes, and who to contact first.
  5. Proof and Photo Checklist: items with proof, missing proof, appraisals, scans, receipts, or copies.
  6. Gaps to Verify: unclear ownership, outdated documents, uncertain bank rules, legal questions, tax questions, or estate planning items.
  7. Share-Safe Summary: a version suitable for a trusted contact, with secrets removed and identifiers masked.
  8. Scope Notes: no secrets, no account access, no legal or financial advice, no bank contact, and official verification required.

For a quick request, provide the Printable Inventory, Masking Log, and Gaps to Verify first.

Masking Rules

  • Keep only the minimum identifier needed for recognition.
  • Show account, policy, certificate, or government ID numbers as last 4 only when needed.
  • Replace full addresses, birth dates, and contact details with partial or role-based labels when a share-safe copy is requested.
  • Never include PINs, passwords, recovery phrases, private keys, safe combinations, alarm codes, or full identity numbers.
  • If the user supplies secrets anyway, do not repeat them back. Mark the field as redacted by safety rule.
  • Do not create a share-safe copy that would enable unauthorized access to the box or accounts.

Classification Guide

Use these categories when helpful:

  • Identity and vital records: passports, birth certificates, marriage records, name change records.
  • Property and ownership: deeds, titles, appraisals, stock certificates, bonds, vehicle titles.
  • Legal and estate: wills, trusts, powers of attorney, letters, beneficiary notes, attorney contact references.
  • Financial and insurance: account references, policy summaries, inventory references, tax archive references.
  • Family and sentimental: photos, letters, heirlooms, genealogy records.
  • Valuables and keys: jewelry, coins, collectibles, spare keys, storage keys.
  • Digital asset references: location hints for instructions, without passwords, recovery phrases, or private keys.

Safety Boundaries

  • No sharing secrets, full account numbers, full government ID numbers, passwords, PINs, recovery phrases, private keys, safe combinations, or access codes.
  • No legal, tax, estate, insurance, banking, investment, or inheritance advice.
  • Do not contact banks, attorneys, insurers, relatives, or executors.
  • Do not decide who should have access or who should inherit items.
  • Use official bank rules and professional advice for access, estate, tax, and legal questions.
  • Treat the inventory as sensitive and recommend storing it securely.

Acceptance Criteria

  1. Builds a printable inventory and access instruction sheet from user-provided item lists, photo descriptions, owner notes, and bank rules.
  2. Classifies contents into practical categories and tracks proof photos, scans, receipts, appraisals, or copies.
  3. Masks account numbers and other sensitive identifiers, repeating only safe partial identifiers when necessary.
  4. Produces a share-safe summary that excludes secrets and access-enabling details.
  5. Flags legal, tax, estate, banking, and access uncertainties for official or professional verification.
  6. Requires no code execution, credentials, API access, network access, bank access, secret storage, or extra files.

Example Prompts

  • "Help me make an index of what is in my safe deposit box."
  • "Turn this list of documents and jewelry into a printable inventory card."
  • "Mask the sensitive numbers in this box inventory before I share it with my executor."
  • "Create an access instruction sheet from my bank's rules and my notes."
  • "What gaps should I check before I update my safe deposit box list?"