Sop Generator
v0.1.0Turn messy recordings, transcripts, voice notes, or brain dumps into clean, team-ready Standard Operating Procedures (SOPs). Use when you have Loom videos, m...
⭐ 1· 252·2 current·2 all-time
byJatin Khatri@jk-0001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The SKILL.md content directly implements the stated purpose (turning recordings/transcripts/notes into SOPs). There are no unrelated requirements, binaries, or config paths.
Instruction Scope
Instructions stay within SOP extraction and formatting. They recommend using third-party transcription services (Whisper, Otter.ai, Rev, Claude) and testing SOPs. This is expected but means the agent or user may need to upload content to external services — a privacy consideration. The instructions do not tell the agent to access system files, hidden credentials, or other unrelated data.
Install Mechanism
No install spec and no code files — nothing is written to disk or installed. This is low-risk and consistent with an instruction-only skill.
Credentials
The skill requests no environment variables or credentials. However, because it recommends external transcription and AI services, the agent or user may be asked separately to provide API keys or upload files to those services; such requests are outside the skill's declared scope and should be validated before sharing secrets or sensitive media.
Persistence & Privilege
always is false, the skill does not request persistent presence, and there are no instructions to modify agent/system configuration or other skills.
Assessment
This skill is coherent and low-risk as-is: it only contains instructions for converting recordings/notes into SOPs and does not ask for installs or secrets. Before using it, decide how you will handle raw material: prefer giving transcripts rather than uploading sensitive video/audio to third-party transcription or AI services. If the agent asks for API keys or access to cloud storage, confirm that those requests are necessary and provide the minimum permissions possible. Review any SOP outputs for accidental leakage of sensitive data and avoid allowing autonomous uploads of proprietary recordings to external services without explicit review.Like a lobster shell, security has layers — review code before you run it.
latestvk97b6y9zkw9885hw5nbbx1bke982dyr1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
