AML/KYC Documentation Generator
v1.0.0Generate UK AML/KYC compliance documentation — customer due diligence records, risk assessments, policies, and SAR drafts for regulated businesses. Use when...
⭐ 0· 53·0 current·0 all-time
byExternalOS@jamespatrickthom2003-star
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md and README: the skill only generates AML/KYC document templates and makes no attempt to perform identity, PEP, or sanctions screening. It requests no binaries, env vars, or installs — proportional to a template generator. Note: source/homepage is unknown which affects provenance but not coherence.
Instruction Scope
SKILL.md provides detailed templates and explicit runtime instructions (including a mandatory disclaimer to repeat on every output). It does not instruct the agent to read local files, environment variables, or call external endpoints. Caution: it includes creating Suspicious Activity Report (SAR) drafts and PEP/sanctions screening record fields — these are sensitive and legally consequential; the skill repeatedly states it does NOT perform actual checks and that outputs are not legal advice.
Install Mechanism
No install spec and no code files — instruction-only skill. No downloads or external packages are requested, minimizing installation risk.
Credentials
No environment variables, credentials, or config paths are required. The absence of secret requests is proportionate to a document/template generation tool.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request persistent presence or modification of other skills/configuration. Autonomous invocation is allowed (platform default) but not combined with broad privileges.
Assessment
This skill appears coherent and limited to generating templates, but consider these practical cautions before using it in production: (1) provenance unknown — outputs should be reviewed by your MLRO or legal counsel before relying on them; (2) do NOT paste real personal data (IDs, sensitive PII) into prompts unless you trust the execution environment, because the skill will include those values verbatim in generated documents; (3) SAR drafts and records are legally sensitive — follow internal MLRO procedures and avoid 'tipping-off'; (4) the skill explicitly does not perform PEP/sanctions/ID verification — use accredited verification providers for screening and retain evidence of checks; (5) validate that the skill actually repeats the required disclaimer on every output as claimed. If you need stronger assurance, request the skill owner/source, a changelog or legal review, or prefer a vetted commercial product with known provenance.Like a lobster shell, security has layers — review code before you run it.
amlvk976x0zbc40hjffkgbn7excr4d84e6cvcompliancevk976x0zbc40hjffkgbn7excr4d84e6cvkycvk976x0zbc40hjffkgbn7excr4d84e6cvlatestvk976x0zbc40hjffkgbn7excr4d84e6cvlegalvk976x0zbc40hjffkgbn7excr4d84e6cvregulatedvk976x0zbc40hjffkgbn7excr4d84e6cvukvk976x0zbc40hjffkgbn7excr4d84e6cv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
