Visual Concept

v1.0.1

Transform technical insights into visual concept guides — symbolic imagery, color arcs, and creative direction for video

0· 736·3 current·3 all-time
byLee Brown@leegitw
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and runtime instructions consistently describe a creative transformation of conversation-derived technical insights into visual concept guides. The skill declares no binaries, credentials, or config paths, which aligns with its stated standalone creative role.
Instruction Scope
The SKILL.md explicitly instructs the agent to 'read full conversation context' and synthesize from user input or current conversation. That is appropriate for a creative/contextualizer skill, but it means the skill will implicitly consume whatever conversational context is available (which may include sensitive details). The instructions avoid file I/O, external endpoints, or unrelated system access.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk and no external packages are fetched. This is the lowest-risk install profile.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no disproportionate credential or environment access relative to its purpose.
Persistence & Privilege
always is false and the skill does not request persistent system privileges or modification of other skills/configs. It is user-invocable and may be invoked autonomously per platform defaults, which is expected for skills of this type.
Assessment
This skill is coherent and fits its creative purpose. Before installing, be aware it will read and synthesize from the conversation context — avoid invoking it on conversations that include secrets or private credentials. If you need stronger guarantees about data handling, ask the skill author for explicit privacy or retention statements or run it only on sanitized inputs.

Like a lobster shell, security has layers — review code before you run it.

concept-artvk979fzcve8p2v854tjbhbnqyy581vp41creativevk979fzcve8p2v854tjbhbnqyy581vp41directionvk979fzcve8p2v854tjbhbnqyy581vp41imageryvk979fzcve8p2v854tjbhbnqyy581vp41latestvk979fzcve8p2v854tjbhbnqyy581vp41reflectionvk979fzcve8p2v854tjbhbnqyy581vp41storyboardvk979fzcve8p2v854tjbhbnqyy581vp41synthesisvk979fzcve8p2v854tjbhbnqyy581vp41videovk979fzcve8p2v854tjbhbnqyy581vp41visualvk979fzcve8p2v854tjbhbnqyy581vp41

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments