UX

v1.0.0

Design and analyze user experiences that are intuitive, efficient, and aligned with user mental models.

2· 1.3k·2 current·2 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (UX design and analysis) align with the SKILL.md content, which contains UX heuristics and flow guidance. There are no unrelated requirements (no binaries, env vars, or config paths).
Instruction Scope
SKILL.md contains only design guidelines and checklists (flow analysis, mental models, accessibility, copy, etc.). It does not instruct the agent to read files, access environment variables, call external endpoints, or transmit data.
Install Mechanism
No install spec is present. This is instruction-only, so nothing is written to disk or downloaded during install.
Credentials
The skill requests no environment variables, credentials, or config paths—appropriate for a purely advisory UX skill. Note: the skill source/homepage are unknown, but that affects provenance rather than required permissions.
Persistence & Privilege
Flags are default (always: false). It does not request persistent presence or elevated privileges. Agent-autonomous invocation is permitted by platform default but there is nothing in the skill that requires persistent or cross-skill configuration.
Assessment
This skill is a text-only UX checklist and appears internally consistent and low-risk: it asks for nothing and contains only design advice. Before installing, note that the skill's source/homepage are not provided (limited provenance). Because the platform allows skills to be invoked autonomously by default, consider whether you want the agent to use this guidance without prompting; otherwise use it on-demand. If you need stronger assurance, prefer skills with a known author/homepage or review any future skill updates that add installs or credential requests.

Like a lobster shell, security has layers — review code before you run it.

latestvk978q1254qdhrzgr5hhgbe3rhn80x7ah

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🧠 Clawdis
OSLinux · macOS · Windows

Comments