Social Video Resizer

v1.0.0

Adapt one social video into platform-ready aspect ratios and dimensions for TikTok, Reels, Shorts, feeds, stories, and ads without awkward stretching or lost...

0· 87·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and required inputs (source video, target platforms, priority areas) align with a video-resizing/adaptation helper. It does not request unrelated credentials, binaries, or config paths.
Instruction Scope
SKILL.md contains focused, high-level workflow steps (decide crop/pad/scale, protect faces/subtitles, output versions). It does not instruct reading unrelated files or env vars. Note: it is procedural guidance only and does not specify tools or where processing happens (local vs remote), so implementers must decide how to run the transforms.
Install Mechanism
No install spec and no code files — instruction-only — so nothing is written to disk or downloaded during install.
Credentials
No environment variables, credentials, or config paths are requested. The declared inputs are proportional to the task (a source video and resize targets).
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or change other skills' configs. Autonomous invocation is allowed by default but not combined with other red flags.
Assessment
This skill is an instruction-only recipe for producing platform-ready video variants and is internally coherent, but consider the following before use: (1) Clarify where processing occurs — local machine, hosted service, or third-party API — and avoid uploading sensitive footage to unknown endpoints. (2) Confirm which tools will actually perform the resize (e.g., ffmpeg or an editing service) and whether those tools require installation or credentials. (3) Limit the agent's file access to only the source video(s) needed and verify outputs are stored where you expect. (4) If you need automated processing, ask the skill author or integrator to provide an explicit, auditable implementation that documents any network endpoints, binaries used, and data retention policy. These checks will reduce privacy and data-exfiltration risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d359r125sdzs16n3kje3xh983cje9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments