Obgyn Video
v1.0.0Create customized 60-90 second videos showcasing OB-GYN care approach, services, communication style, and practice culture to build patient trust and enrollm...
⭐ 0· 39·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and runtime instructions align: the skill asks for practice details and generates 60–90s scripts. It does not request unrelated binaries, cloud credentials, or system access.
Instruction Scope
Instructions stay within the stated purpose (gather practice focus, communication style, affiliations, etc.) — however the skill may prompt users for sensitive or patient-related anecdotes/testimonials; the SKILL.md does not mention consent, de‑identification, or handling of protected health information (PHI).
Install Mechanism
Instruction-only skill with no install spec and no code files, so nothing is written to disk or downloaded during install.
Credentials
No environment variables, credentials, or config paths are requested; required access is minimal and proportional to the task. Users still may supply sensitive content interactively, which is outside the skill's declarations.
Persistence & Privilege
Skill does not request permanent/always-on presence and does not modify agent or system configurations; autonomous invocation is platform default and not in itself a concern here.
Assessment
This skill appears coherent, but before using it: do not paste patient-identifiable information or PHI into prompts; obtain written consent before including patient testimonials or recordings; de-identify examples where possible; review generated scripts for clinical accuracy and regulatory compliance (e.g., HIPAA in the U.S.); and confirm provider claims (hospital affiliations, service capabilities) before publishing. If you want stronger guarantees, avoid enabling autonomous invocation or restrict the skill's use to staff who understand privacy rules.Like a lobster shell, security has layers — review code before you run it.
latestvk977frygtp415160kjhbmraem18437c6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
