Lunchbox Planner
v1.0.0Helps plan practical lunch boxes for adults or children based on nutrition goals, ingredients, time, budget, storage, and reheating constraints.
⭐ 0· 90·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md content; the skill only requires reasoning and text output for planning lunch boxes and does not request unrelated binaries, environment variables, or credentials.
Instruction Scope
The SKILL.md stays within the domain of meal planning and food-safety guidance. One minor point: it explicitly allows the agent to 'infer carefully' and proceed when details are missing, which grants the assistant some discretion to make assumptions — this is reasonable for a planning assistant but could produce unexpected results if you prefer the assistant to wait for explicit constraints.
Install Mechanism
There is no install spec and no code files — the skill is instruction-only, so nothing is written to disk or downloaded at install time.
Credentials
The skill requests no environment variables, credentials, or config paths. All runtime behavior is specified in prose and requires only the agent's ability to generate text.
Persistence & Privilege
always is false, the skill is user-invocable and not force-included. It does not request persistent system privileges or modify other skills or system settings.
Assessment
This skill is text-only and does not request credentials or install software, so its footprint is minimal. Before using: (1) if you have strict constraints (allergies, storage/reheating limits, exact budget), state them explicitly because the skill may otherwise make reasonable assumptions; (2) verify any food-safety or allergy advice the assistant gives before acting on it; (3) because it runs as an AI instruction set, review outputs for accuracy (portions, prep times, ingredient compatibility) rather than trusting them automatically.Like a lobster shell, security has layers — review code before you run it.
latestvk979k471d665bgym9xsj96sahx83k5mr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
