Wedding Venue Video

v1.0.0

Creates emotionally compelling venue tour and highlight videos to drive wedding venue bookings and convert tours into signed contracts.

0· 51·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (creating venue tour/highlight videos to drive bookings) match the SKILL.md content (detailed video types, shot/script templates, and marketing guidance). There are no unrelated requirements (no cloud keys, no binaries).
Instruction Scope
The SKILL.md contains editorial and production guidance (shot lists, scripts, CTAs). It does not instruct the agent to read local files, access environment variables, or transmit unrelated data. Any prompts to collect venue details would be expected and proportional.
Install Mechanism
No install spec and no code files (instruction-only). Nothing is written to disk or downloaded, so there is minimal installation risk.
Credentials
The skill declares no environment variables, credentials, or config paths. That aligns with its purpose of providing templates and guidance—no privileged access is requested.
Persistence & Privilege
Skill is not always-on and uses the platform default for autonomous invocation. It does not request permanent presence or system-wide config changes.
Assessment
This skill is an instruction-only collection of video and marketing templates and appears internally consistent. Before using, verify you do not paste private customer data into autogenerated scripts, obtain written release/consent from couples shown in videos, and confirm any recommended music or vendor content is properly licensed. Because the skill can be invoked by the agent, review outputs before publishing; no credentials or system access are requested, so installation risk is low.

Like a lobster shell, security has layers — review code before you run it.

latestvk978gsqp63b4gppnm042qpnn7984ez36

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments