Family Lawyer Video

v1.0.0

Creates 60-90 second scripts for family law attorneys to produce client empathy and legal process videos that explain cases honestly and reduce fear.

0· 37·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the SKILL.md instructions: ask about the video type and practice focus, gather relevant case context, and produce 60–90s empathy/process scripts. No unrelated binaries, env vars, or config paths are required.
Instruction Scope
Instructions stay within the claimed purpose (collect context from the user and generate short scripts). One attention point: it asks the agent to 'gather' a 'typical client situation', which may involve sensitive client details — the skill does not instruct reading files or secrets, but users should avoid pasting real client-identifying or privileged information.
Install Mechanism
No install spec and no code files — instruction-only surface, so nothing is written to disk or fetched at install time.
Credentials
No environment variables, credentials, or config paths are requested; this is proportionate to an assistant that drafts short marketing/education scripts.
Persistence & Privilege
always is false and the skill does not request persistent or elevated presence. Autonomous invocation is allowed (platform default) but there are no additional privileges or cross-skill configuration changes requested.
Assessment
This skill appears coherent and low-risk: it only produces short video scripts and asks questions to gather context. Before using it, avoid entering real client-identifying details or privileged communications (use anonymized examples), review generated scripts for legal accuracy and jurisdictional correctness, add appropriate disclaimers in videos, and be mindful of malpractice/privacy obligations when turning client situations into marketing content.

Like a lobster shell, security has layers — review code before you run it.

latestvk978sg5dvgvmb0fd0yeatf5sm98427zf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments