Video Script Generator
v5.0.0How to generate video scripts for the Video Generator from user prompts.
⭐ 0· 106·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md content: the document explains how to convert user prompts into entries for input/input-scripts.json and how to annotate visual and audio options. There are no unrelated environment variables, binaries, or external services required in the metadata.
Instruction Scope
Instructions are narrowly scoped to generating JSON entries (fields, voice IDs, Director Mode tags, and writing guidelines). The only file paths mentioned (input/input-scripts.json and input-assests/) are reasonable for a video-generator workflow and the doc does not instruct the agent to read unrelated system files or exfiltrate data.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or downloaded during install.
Credentials
The skill declares no environment variables, credentials, or config paths; the voices and asset fallbacks referenced are plausible for a video generation service and don't require secrets.
Persistence & Privilege
always is false and the skill does not request elevated or persistent privileges or modify other skills/config. Autonomous invocation is allowed (platform default) but the skill's scope is limited and consistent with that capability.
Assessment
This skill is instruction-only and appears coherent for creating video-generator job JSON (voice IDs, visual cue tags, and file paths). Before installing or using it: 1) confirm your target video generator expects the same file paths and voice IDs to avoid mismatches; 2) test with non-sensitive example prompts to ensure behavior matches expectations; 3) verify any referenced asset sources (e.g., Pixabay) meet your licensing needs. Because the skill is just documentation (no code, no downloads, no secrets), there is minimal technical risk from the skill itself — only operational mismatches (naming, voice IDs, asset policies) to watch for.Like a lobster shell, security has layers — review code before you run it.
latestvk9720djh32r0f750gbsgdw3mpx84dhkv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
