Cybersecurity Video
v1.0.0Create brief, tailored scripts for cybersecurity consultants to produce educational and assessment videos on risk, compliance, and incident response.
⭐ 0· 40·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md: the skill asks for consultant context and produces short video scripts. It does not request unrelated binaries, credentials, or system access.
Instruction Scope
Instructions stay within the stated purpose (collect consultant specializations/certs/methodology and generate 60–90 second scripts). One item suggests a "specific vulnerability demonstration (non-sensitive)" — this can be legitimate for an educational video but could be misused if the assistant provides actionable exploit steps. Recommend the skill explicitly restrict demonstrations to conceptual, non-actionable explanations and avoid detailed exploit code or step-by-step attack techniques.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is written to disk or downloaded during installation.
Credentials
No environment variables, credentials, or config paths requested. The skill does not ask for secrets or access to external systems, which is proportional to its purpose.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request persistent or elevated privileges. Autonomous invocation is allowed by platform default but is not combined with other risky indicators.
Assessment
This skill appears coherent with its stated purpose and doesn’t request credentials or install code. Before installing or using it, consider: (1) avoid prompting the skill to generate exploit-level details — keep vulnerability demonstrations conceptual and non-actionable; (2) do not paste real client secrets, logs, or PII into prompts when generating videos; (3) if you need regulatory or compliance statements in scripts, verify factual accuracy against authoritative sources. If the publisher is unknown and you plan to use templates in a commercial setting, validate outputs for accuracy and safety before distribution.Like a lobster shell, security has layers — review code before you run it.
latestvk97fdk6hjed6s0hmfk88tamx05843z07
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
