Privacy Gdpr
v1.0.0Deep privacy/GDPR-oriented workflow—lawful basis, data inventory, minimization, DSAR process, DPIA triggers, subprocessors, and breach notification mindset....
⭐ 0· 85·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (deep GDPR/privacy workflow) match the SKILL.md content: a six-stage compliance/playbook for data practices. There are no unrelated requirements (no binaries, env vars, or installs) that would be out of scope.
Instruction Scope
SKILL.md contains high-level, structured guidance and checklists (roles, inventory, lawful basis, DSARs, DPIA, subprocessors). It does not instruct the agent to read local files, access environment variables, call external endpoints, or collect/transmit data. It explicitly disclaims legal advice and directs escalation to legal/compliance.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is written to disk and no third-party packages or downloads are requested.
Credentials
The skill requests no environment variables, credentials, or config paths. The operational guidance references practices (logs, backups) but does not request access to them.
Persistence & Privilege
always is false and the skill does not request persistent presence or to modify agent/system settings. Autonomous invocation is allowed (the platform default) but nothing in the skill itself elevates privilege.
Assessment
This skill is a structured checklist and workflow for GDPR/privacy planning and appears coherent and low-risk because it only contains guidance text. Before using it operationally: (1) remember it is not legal advice — have legal/compliance validate decisions and lawful-basis mappings; (2) do not give the agent direct access to live PII systems or credentials when following the playbook — treat any outputs as draft guidance and review before applying to real data; (3) ensure DSAR, erasure, and retention actions are implemented with proper authentication, audit logging, and human oversight; (4) if you plan to integrate these procedures into automated tooling, validate that the tooling only accesses the minimum data necessary and that logs/archives are handled per your retention policy. Overall, the skill is coherent but should be used with professional review and operational safeguards.Like a lobster shell, security has layers — review code before you run it.
latestvk97aqkwtvgf65wbspde3d3pqph83ka9b
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
