Meeting Notes to Actions
v1.0.0Transform raw meeting notes or transcripts into structured summaries, action items with owners and deadlines, individual follow-up emails, and next meeting a...
⭐ 0· 62·0 current·0 all-time
byExternalOS@jamespatrickthom2003-star
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, README, and SKILL.md all describe the same functionality (parsing pasted meeting notes/transcripts and producing summaries, action items, emails, agendas). No binaries, credentials, or config paths are requested — nothing disproportionate to producing text outputs from user-provided notes.
Instruction Scope
SKILL.md is prescriptive about parsing input and producing copy-paste-ready outputs. It instructs the agent to infer missing data (dates, deadlines, priorities, owners) and not to ask format clarification. This stays within the feature scope but means the agent may create inferred deadlines/owners that could be incorrect; it does not instruct reading files, accessing system secrets, or calling external endpoints.
Install Mechanism
Instruction-only skill with no install spec and no code files. Low risk: nothing will be written to disk or downloaded during install.
Credentials
No environment variables, credentials, or external service tokens are requested. The skill operates solely on user-pasted content, which is proportional to its stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent presence or modify other skills/system settings. It also does not include any install-time hooks or background processes.
Assessment
This skill appears coherent and safe from a permissions/installation perspective, but before using it consider: (1) privacy — you will be pasting meeting content (potentially sensitive) into the agent, so ensure you have permission and avoid sharing secrets or legally protected material; (2) inferred data — the skill will infer dates, deadlines, owners and priorities when not explicit, which can introduce errors, so review outputs before sending; (3) sender/recipient identity — the skill assumes the user is the sender and will generate personalized emails; if you integrate this output into automated email-sending workflows, verify that no automatic sending occurs without explicit confirmation; (4) audit — because it’s instruction-only with no install, there’s no hidden network endpoint or credential exfiltration in the package, but always treat pasted content as potentially sensitive.Like a lobster shell, security has layers — review code before you run it.
actionsvk97ae7kksy4gacbzjrq3r20z7984e9cremailvk97ae7kksy4gacbzjrq3r20z7984e9crlatestvk97ae7kksy4gacbzjrq3r20z7984e9crmeetingvk97ae7kksy4gacbzjrq3r20z7984e9crnotesvk97ae7kksy4gacbzjrq3r20z7984e9crproductivityvk97ae7kksy4gacbzjrq3r20z7984e9cr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
