Podcast
v1.0.1Create and grow podcasts by planning episodes, producing audio or video, generating clips, and building audience across formats.
⭐ 2· 1.8k·18 current·18 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the content: all files provide planning, production, AI-generation, distribution, and growth advice for podcasts. There are no unrelated requested binaries, environment variables, or config paths.
Instruction Scope
SKILL.md and the other .md files contain procedural guidance, templates, and example commands (ffmpeg, whisper pseudocode, ElevenLabs pseudocode). The instructions do not direct the agent to read system files, access unrelated credentials, or transmit data to hidden endpoints. They reference third‑party services (ElevenLabs, OpenAI TTS, NotebookLM, hosting platforms) only as tools to use, which is expected for this domain.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk or downloaded by the skill itself, minimizing install-time risk.
Credentials
The skill does not require any environment variables, credentials, or config paths. It mentions external services in documentation but does not request or try to store keys or secrets itself, which is proportionate to a how-to skill.
Persistence & Privilege
always is false and the skill does not request persistent system privileges or modify other skills. Autonomous invocation is allowed (platform default) but there are no additional privileges or persistent hooks added by this skill.
Assessment
This skill is an offline, instruction-only podcast playbook — it appears coherent and safe to read/use. Before relying on it operationally, note: (1) it references third-party services (ElevenLabs, OpenAI TTS, NotebookLM, hosting platforms) that typically require paid accounts and API keys — the skill does not supply or manage those keys, so you must obtain and secure any credentials yourself; (2) it discusses voice cloning and AI-generated content: follow platform terms of service and legal/ethical rules (do not clone voices without consent, disclose synthetic voices where required); (3) example commands (ffmpeg, whisper, pseudocode) assume you will run those tools locally — review and test them in a safe environment before executing; and (4) because the skill can be invoked by the agent autonomously (platform default), avoid giving the agent heightened privileges or secrets alongside this skill unless you trust it to act only within the documented guidance.Like a lobster shell, security has layers — review code before you run it.
latestvk9798vq0tw3v6tc5pab26cm17d8100m6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
