TED Talk
v1.0.2Transform technical insights into full 40-50 minute TED-style talks with concrete examples and Q&A
⭐ 1· 416·0 current·0 all-time
byLee Brown@leegitw
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (generate full TED-style talks from technical conversations) aligns with the instructions: the SKILL.md defines steps to synthesize conversation context into a narrative, lists no unrelated dependencies, and declares it does not read workspace files or require credentials.
Instruction Scope
Runtime instructions direct the agent to 'read full conversation context' and extract concrete details/decisions from that context. This is coherent for a talk-generation skill, but it means any sensitive information present in the conversation can be used in outputs. The skill explicitly states it will not read files or project artifacts, which matches the registry metadata.
Install Mechanism
There is no install spec and no code files—this is instruction-only, so nothing will be downloaded or written to disk. That minimizes filesystem and supply-chain risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no request for unrelated secrets or cloud credentials, which is proportionate to the stated purpose.
Persistence & Privilege
The skill is not always-included and is user-invocable; it does not request elevated or persistent agent privileges. Autonomous invocation is enabled by default (normal), but combined with the lack of extra privileges this is expected and not concerning.
Assessment
This skill appears coherent and low-risk because it has no install steps and asks for no credentials. Before using it: (1) avoid including any secrets, passwords, or private data in the conversation context you ask the skill to synthesize (the skill will read the full conversation), and (2) check any concrete examples the skill generates for accuracy and privacy (it should not invent specifics, but validate outputs before sharing). If you need the talk to reference code or files, save/remove sensitive data first because the skill states it won't read project files automatically.Like a lobster shell, security has layers — review code before you run it.
creativevk972pec40yrr9nba79j5pzejp581vceqknowledge-transfervk972pec40yrr9nba79j5pzejp581vceqlatestvk972pec40yrr9nba79j5pzejp581vceqpresentationvk972pec40yrr9nba79j5pzejp581vceqreflectionvk972pec40yrr9nba79j5pzejp581vceqspeakingvk972pec40yrr9nba79j5pzejp581vceqstorytellingvk972pec40yrr9nba79j5pzejp581vceqsynthesisvk972pec40yrr9nba79j5pzejp581vceqteachingvk972pec40yrr9nba79j5pzejp581vceq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
