automation-workflows

v1.0.0

Design and implement automation workflows to save time and scale operations as a solopreneur. Use when identifying repetitive tasks to automate, building wor...

0· 17·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchasesRequires OAuth tokenRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md content: the file is a how-to for identifying, designing, and implementing automations in Zapier/Make/n8n. It does not request unrelated binaries, config paths, or credentials.
Instruction Scope
Runtime instructions focus on auditing tasks, mapping triggers/actions, testing, and tool selection. The doc advises authenticating to third-party services via their normal OAuth flows (expected). It does not instruct the agent to read system files, environment variables, or harvest unrelated data.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or downloaded. This minimizes execution risk.
Credentials
The skill itself does not declare or require any environment variables or credentials, which is appropriate. However it instructs users to connect third-party services (OAuth/API tokens) as part of normal usage — users should review and limit OAuth scopes, avoid sharing long-lived master keys, and prefer least-privilege tokens. This is expected but worth attention.
Persistence & Privilege
always is false and there are no install actions that modify agent/system configuration. The skill can be invoked autonomously per platform defaults, but there's no indication it needs persistent elevated privileges.
Assessment
This is a cohesive, instruction-only playbook for no-code automations (Zapier/Make/n8n). No code will be installed by the skill itself, but you will be asked to connect your third-party accounts when you implement workflows. Before granting access: (1) review OAuth scopes and prefer least-privilege tokens, (2) consider using separate/test accounts or short-lived tokens for automation, (3) prefer self-hosted n8n if you want more control over your data, (4) test workflows with non-sensitive data and enable error notifications, and (5) revoke tokens or disconnect apps when no longer needed. Also note the skill author/homepage is not provided—if provenance matters to you, consider asking the publisher for more information before relying on the guidance.

Like a lobster shell, security has layers — review code before you run it.

aivk977fpadd35czansad3kg565qn851wd1latestvk977fpadd35czansad3kg565qn851wd1

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments