Upload Video Converter

v1.0.0

Upload Video Converter for creators, ecommerce teams, and operators. Use when you need help with video conversion for compatibility and uploads.

0· 89·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (video conversion for creators/ecommerce) match the SKILL.md content: guidance, decision framing, and operational checklists for conversion and uploads. There are no unrelated requirements (no extra env vars, binaries, or config paths).
Instruction Scope
SKILL.md contains only workflow and output templates for producing recommendations and checklists. It does not instruct the agent to read system files, access credentials, call external endpoints, or perform actions outside the stated problem framing.
Install Mechanism
There is no install spec and no code files — this is instruction-only, so nothing is written to disk or fetched during install. That minimizes risk and is proportionate for a guidance-style skill.
Credentials
The skill requires no environment variables, credentials, or config paths. This is appropriate for an advisory/templating skill that doesn't integrate with external APIs or services.
Persistence & Privilege
The skill does not request always:true and is user-invocable with normal autonomous invocation allowed (the platform default). It does not claim to modify other skills or system-wide settings.
Assessment
This is a low-risk, instruction-only skill that provides templates and an operational workflow for video conversion. Before installing or using it: (1) note the source is unknown — prefer skills from known publishers when possible; (2) do not paste secrets or sensitive metadata into prompts (video files can contain PII in metadata); (3) if you later connect this guidance to an upload or conversion service, that integration will require credentials — only provide those to trusted, documented services; (4) review any future versions for added install steps, network calls, or environment-variable requirements, since those would change the risk profile.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c19tqpzv16ze2n20gsr9m1x83d11c

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments