Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md content (a high-level, actionable SOP for livestream commerce). The skill requests no binaries, env vars, or config paths — which is appropriate for a documentation/instruction-only skill. Note: the skill's source/homepage are unknown, but that affects provenance, not internal coherence.
Instruction Scope
SKILL.md contains high-level steps, metrics, risk/compliance reminders, and reusable checklist items. It does not instruct the agent to read files, access environment variables, call external endpoints, or perform system actions beyond producing guidance.
Install Mechanism
No install spec and no code files (instruction-only). This is the lowest-risk installation model and matches the skill's purpose.
Credentials
The skill requests no credentials, env vars, or config paths. That is proportionate for a guidance/SOP skill.
Persistence & Privilege
always:false and model invocation is allowed (the platform default). There is no indication the skill requests permanent presence or modifies other skills/config — this is consistent with an instruction-only helper.
Assessment
This skill is an instruction-only SOP for livestream commerce and appears internally consistent and low-risk. Before installing, consider: (1) provenance — the source and homepage are unknown, so if you require vendor accountability or updates, verify the author; (2) autonomy — the skill can be invoked by the agent (normal behavior); if you prefer to approve uses manually, restrict automatic invocation in your agent settings; (3) data handling — the skill itself doesn't request secrets or access, but if you ask it to apply the SOP to real internal data, ensure you don't pass sensitive credentials or PII unless intentionally authorized; (4) review content for regulatory specifics (local law references) before using as policy. If you need stricter guarantees, ask the publisher for a verifiable source or a changelog before deploying widely.Like a lobster shell, security has layers — review code before you run it.
latestvk973vfnsbv39xjpr8cwg25029n83cshw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
