Wedding Venue Video
v1.0.0Creates emotionally compelling venue tour and highlight videos to drive wedding venue bookings and convert tours into signed contracts.
⭐ 0· 51·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (creating venue tour/highlight videos to drive bookings) match the SKILL.md content (detailed video types, shot/script templates, and marketing guidance). There are no unrelated requirements (no cloud keys, no binaries).
Instruction Scope
The SKILL.md contains editorial and production guidance (shot lists, scripts, CTAs). It does not instruct the agent to read local files, access environment variables, or transmit unrelated data. Any prompts to collect venue details would be expected and proportional.
Install Mechanism
No install spec and no code files (instruction-only). Nothing is written to disk or downloaded, so there is minimal installation risk.
Credentials
The skill declares no environment variables, credentials, or config paths. That aligns with its purpose of providing templates and guidance—no privileged access is requested.
Persistence & Privilege
Skill is not always-on and uses the platform default for autonomous invocation. It does not request permanent presence or system-wide config changes.
Assessment
This skill is an instruction-only collection of video and marketing templates and appears internally consistent. Before using, verify you do not paste private customer data into autogenerated scripts, obtain written release/consent from couples shown in videos, and confirm any recommended music or vendor content is properly licensed. Because the skill can be invoked by the agent, review outputs before publishing; no credentials or system access are requested, so installation risk is low.Like a lobster shell, security has layers — review code before you run it.
latestvk978gsqp63b4gppnm042qpnn7984ez36
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
