Impeccable ans Complete UX/UI Skill

v1.0.0

The design language that makes AI better at frontend design. 7 domain-specific references (typography, color, spatial, motion, interaction, responsive, UX wr...

0· 163·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description describe a UX/UI design guidance skill and the SKILL.md provides detailed design rules and a context-gathering protocol consistent with that purpose. There are no unrelated environment variables, binaries, or install steps requested.
Instruction Scope
Instructions are narrowly focused on gathering design context (instructions, .impeccable.md) and producing production-grade frontend code. One required runtime step is to 'run teach-impeccable' if context is missing; the skill bundle provides no implementation for that command (no install or code files). This is not necessarily malicious but could cause the agent to prompt the user or attempt to run an undefined command — review any executed commands or generated outputs before committing changes.
Install Mechanism
No install spec and no code files are included, so nothing will be downloaded or written by the skill itself. This is the lowest-risk install model.
Credentials
The skill does not request any environment variables, credentials, or config paths. Its declared needs (design context files) match the task.
Persistence & Privilege
The skill does not request always:true and has default autonomous invocation. Autonomous invocation is normal for skills; nothing here indicates elevated or persistent privileges beyond normal operation.
Assessment
This is an instruction-only UX/UI design skill that appears internally consistent and requests no secrets or installs. Before using: verify whether your project contains a .impeccable.md as the skill expects; be aware the SKILL.md requires running a 'teach-impeccable' step that is not provided — the agent may ask you for input or attempt to execute a command that doesn't exist. If you don't want the agent to act autonomously, disable autonomous invocation or review outputs and any file changes before committing them. Always inspect generated code for secrets or unintended modifications.

Like a lobster shell, security has layers — review code before you run it.

latestvk975nwv1vh0ztzvzxfnckvq6j983tfzp

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments