Frontend Design

v0.1.0

Create distinctive, production-grade frontend interfaces with high design quality. Use this skill when building web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.

39· 16.7k·133 current·143 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The SKILL.md describes producing production-grade frontend code and aesthetic guidance; there are no unrelated env vars, binaries, or install steps. The requested capabilities are proportional to the stated purpose.
Instruction Scope
Instructions focus on design decisions and producing working HTML/CSS/JS or framework code. The skill does not instruct the agent to access files, environment variables, or external endpoints directly, but generated code may reference third-party fonts, CDNs, or libraries (the README even suggests 'Motion library for React when available'), so review any external resource usage in outputs.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing is written to disk or fetched by an installer as part of the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths—no disproportionate access is requested.
Persistence & Privilege
always is false and the skill is user-invocable. Model invocation is allowed (the platform default) but the skill does not request persistent privileges or modify other skill/system configurations.
Assessment
This skill appears coherent and low-risk because it only contains design and implementation instructions and requests no credentials or installs. Before using outputs in production, review any generated code for: (1) external dependencies (fonts, CDNs, runtime libraries) and their licenses; (2) network calls or inline scripts that contact third-party endpoints; (3) accessibility and security best practices; and (4) build/tooling integration requirements. If you allow autonomous agents to call skills, remember this one can be invoked by the model (normal behavior) — but because it doesn't ask for secrets, the main risk is unvetted code or external dependencies in the generated output, not credential exposure.

Like a lobster shell, security has layers — review code before you run it.

latestvk9794sgxdxakvtdv3em0bhr8d98100rw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments