Client Communication Drafter
v1.0.0Draft professional client emails and messages for freelancers. Handles project updates, scope changes, payment reminders, feedback requests, difficult conver...
⭐ 0· 86·0 current·0 all-time
byExternalOS@jamespatrickthom2003-star
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md: it only asks the agent to produce send-ready client emails (updates, scope, payments, feedback, difficult conversations). No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
Runtime instructions are limited to composing emails with fixed structures and tone guidance. They do not direct the agent to read files, access environment variables, call external endpoints, or exfiltrate data. The rule against placeholders and prompting for missing details is reasonable for composition tasks.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or fetched during install.
Credentials
The skill declares no required environment variables, credentials, or config paths. The content references UK late-payment law for phrasing but does not request legal credentials or privileged access.
Persistence & Privilege
always is false and the skill does not request persistent privileges or modify other skills or system settings. It is user-invocable and can be called autonomously by the agent (platform default), which is appropriate for this type of skill.
Assessment
This skill is instruction-only and coherent with its advertised function, but you should: 1) review every generated message before sending (especially legal/financial statements like statutory interest or compensation amounts), 2) avoid pasting highly sensitive credentials or private information into prompts, and 3) verify invoice numbers, dates, contract terms, and jurisdiction-specific law references yourself rather than relying solely on the drafted text.Like a lobster shell, security has layers — review code before you run it.
clientvk97aak43wnk5c8r9kbdtffhqrh84f59pcommunicationvk97aak43wnk5c8r9kbdtffhqrh84f59pemailvk97aak43wnk5c8r9kbdtffhqrh84f59pfreelancervk97aak43wnk5c8r9kbdtffhqrh84f59platestvk97aak43wnk5c8r9kbdtffhqrh84f59pukvk97aak43wnk5c8r9kbdtffhqrh84f59p
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
