Amazon Listing Images
v1.0.0Plan Amazon product listing images for maximum conversion. Create shot lists, infographic layouts, lifestyle scene briefs, and A/B testing plans following Am...
⭐ 1· 95·0 current·0 all-time
bynexscope-ai@nexscope
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and SKILL.md align: the skill is about image planning and contains follow-up/questions, output format, and capability list. It does not request unrelated credentials or binaries.
Instruction Scope
Instructions are limited to collecting product info, asking one follow-up, analyzing, and producing recommendations. The phrase "Research and analyze" is slightly vague and could imply web research if the agent has browsing/network capability, but there are no explicit directives to read files, environment vars, or send data to third-party endpoints.
Install Mechanism
There is no install spec in the package (instruction-only), which is low-risk. The SKILL.md includes an optional npx install example pointing to nexscope-ai/eCommerce-Skills — running that would fetch code from an external package, so users should review that package before executing the command.
Credentials
No environment variables, credentials, or config paths are required; requested access is proportional to the stated purpose.
Persistence & Privilege
The skill is not always-enabled and does not request persistent or elevated privileges. It does not attempt to modify other skills or system settings.
Assessment
This skill appears coherent and low-risk: it only needs your product details and will produce image shot lists and briefs. Before running any suggested npx install, review the referenced package (nexscope-ai/eCommerce-Skills) to confirm you trust its source. If the agent has browsing or network access, be aware that the vague "research" step could lead it to fetch external resources — avoid including sensitive or proprietary data in prompts unless you trust how that data will be handled.Like a lobster shell, security has layers — review code before you run it.
latestvk974a5a400bgmvx6c1re294xyn83kb19
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
