Book Summary

v1.0.2

Generate podcast-style audio scripts summarizing books with 3 key ideas, actionable takeaways, and estimated duration for single-narrator delivery.

0· 131·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (podcast-style book summaries) matches the code and SKILL.md. The included index.js implements summary-to-script generation, duration estimation, and text summary functions — all expected for this purpose. No unrelated capabilities are present.
Instruction Scope
SKILL.md and README describe only local generation of summaries and example usage via the exported class. The runtime instructions do not ask the agent to read arbitrary files, environment variables, or send data to external endpoints.
Install Mechanism
There is no install spec that downloads or extracts remote artifacts. The package is instruction-only from the registry with a small included index.js; no external installers, URLs, or archives are used.
Credentials
The skill declares no required environment variables, credentials, or config paths. The code does not access process.env or other secrets. Requested permissions are minimal and proportional to the stated functionality.
Persistence & Privilege
always is false and the skill does not modify other skills or system settings. It contains no code that persists data or elevates privileges.
Assessment
This skill appears internally consistent and low-risk: it only transforms an input summary into a podcast-style script and includes no network, file I/O, or secret access. Before installing, consider: (1) you should only feed text you are allowed to process (copyright concerns when supplying full book text); (2) if you obtained this skill from an untrusted registry source, you may want to review the small index.js yourself (it’s short and readable); (3) normal platform autonomy means the agent can call the skill when invoked — that’s expected here and not a red flag given the skill’s limited scope.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d70b0ma2xpg21nza27976xs83bgha

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments