Pitch Deck Generator
v1.0.0Generate professional pitch deck outlines using the $1B pitch formula based on startup data and company information.
⭐ 0· 124·1 current·1 all-time
byToolWeb@krishnakumarmahadevan-cmd
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name, description, SKILL.md content, and openapi.json all align with generating pitch-deck outlines. Minor caution: the skill's source/homepage are unknown (no provenance metadata), which is a non-technical trust signal but does not create a technical mismatch between purpose and capabilities.
Instruction Scope
SKILL.md contains only instructions and examples for producing pitch deck outlines and example request/response payloads. It does not instruct the agent to read unrelated files, access environment variables, or exfiltrate data.
Install Mechanism
No install spec and no code files — instruction-only. This is low-risk because nothing is written to disk or downloaded during installation.
Credentials
The skill requires no environment variables, credentials, or config paths. The fields in examples (sessionId, userId, timestamp) are reasonable for a stateless outline generator and do not imply secret access.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills. It uses normal, user-invocable settings and does not require elevated privileges.
Assessment
Technically this skill is coherent and low-risk: it generates pitch outlines locally from the data you supply and does not request credentials or install software. However, provenance is unknown (no homepage/author details), so avoid submitting sensitive or proprietary business plans until you trust the source. If you plan to use it regularly, prefer skills with a documented owner or homepage, and watch for future releases that might add install steps or request API keys. If you see the skill later attempting network calls or asking for environment variables, treat that as a red flag and re-evaluate before providing real secrets or IP.Like a lobster shell, security has layers — review code before you run it.
latestvk972s33tp0zxea2m10xfm20znh83hwvs
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
