Short Video Hook Lab
v1.0.3Generate, test, and refine short-video hooks for TikTok, Reels, and Shorts with retention-first structure. Use when the user wants stronger openings, better...
⭐ 0· 318·2 current·2 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name, description, and workflow all align: the skill's purpose is to generate and refine short-video hooks and the SKILL.md describes exactly that. One small note: the card mentions a 'Creatop handoff' but there is no install spec, API keys, or instructions for integrating with Creatop — this is a workflow note rather than an active integration and is not required for the core functionality.
Instruction Scope
Runtime instructions only ask the agent to collect user-provided context (audience, promise, action, platform), generate and score hook variants, and produce filming guidance. There are no steps that read system files, access environment variables, or transmit data to external endpoints.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is downloaded or written to disk.
Credentials
The skill declares no required environment variables, credentials, or config paths. This is proportionate to its stated purpose.
Persistence & Privilege
Flags show always:false and normal user-invocation/autonomy settings. The skill does not request permanent presence or system-level changes.
Assessment
This skill is instruction-only and internally consistent. Before using: (1) note the license is CC BY-NC-SA 4.0 — commercial use requires a separate paid license from Razestar; (2) the SKILL.md references a 'Creatop handoff' but provides no integration details, so expect that handoff to be manual unless your environment already supports Creatop integration; (3) do not paste sensitive or proprietary metrics into prompts (the skill encourages proof-first wording but also warns against using unverified precise numbers); (4) because there is no code to inspect, the regex scanner had nothing to analyze — the lack of findings reflects that fact, not an active security audit. If you plan to automate network handoffs or integrate with third-party tools, request explicit integration details and required credentials from the skill author before enabling automation.Like a lobster shell, security has layers — review code before you run it.
latestvk971nd7d4pq0r8ejesbpzxm1bs82p0dz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
