Side Quests
v1.0.2Full creative synthesis — combine song, visual concept, and TED talk from a single technical insight
⭐ 2· 411·0 current·0 all-time
byLee Brown@leegitw
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (creative synthesis: song, visual concept, TED talk) match the SKILL.md instructions. No binaries, env vars, or config paths are requested, which is proportional for an instruction-only, conversation-based creative skill. Optional component skills are listed as helpers, not required.
Instruction Scope
Runtime instructions direct the agent to 'read full conversation context' and to ground the TED talk in 'concrete, specific details from context provided.' This is coherent for the stated goal, but it means the skill may surface sensitive or proprietary information that exists in the conversation. The skill explicitly states it does not read workspace files or project artifacts, which matches its declared scope.
Install Mechanism
No install spec or code files are present; instruction-only skills are low-risk because nothing is written to disk. The README references an openclaw install command but there is no underlying installer declared here.
Credentials
No environment variables, credentials, or config paths are requested. This is proportionate to a purely conversational creative skill.
Persistence & Privilege
always: false and no special persistence or cross-skill configuration changes are requested. disable-model-invocation is false (normal); the skill can be invoked autonomously but that is the platform default and not combined with broad privileges here.
Assessment
This skill is coherent and appears to do what it says: synthesize creative artifacts from the conversation. Before using it, be mindful that it reads the full conversation context and the TED-talk output is intended to include concrete, specific details from that context — so do not invoke it in threads that contain secrets, proprietary code, or confidential information you wouldn't want reproduced. Consider invoking the skill explicitly (not letting the agent run it autonomously) when working with sensitive material, and review/redact outputs before sharing externally. If you need stricter guarantees, avoid providing sensitive context or disable autonomous invocation at the agent level.Like a lobster shell, security has layers — review code before you run it.
creativevk97fzr277sw33d55cetznasyfn81tcrmknowledge-transfervk97fzr277sw33d55cetznasyfn81tcrmlatestvk97fzr277sw33d55cetznasyfn81tcrmlearningvk97fzr277sw33d55cetznasyfn81tcrmreflectionvk97fzr277sw33d55cetznasyfn81tcrmsongwritingvk97fzr277sw33d55cetznasyfn81tcrmstorytellingvk97fzr277sw33d55cetznasyfn81tcrmsunovk97fzr277sw33d55cetznasyfn81tcrmsynthesisvk97fzr277sw33d55cetznasyfn81tcrmted-talkvk97fzr277sw33d55cetznasyfn81tcrmvisual-guidevk97fzr277sw33d55cetznasyfn81tcrm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
